WorldWideScience

Sample records for non-proprietary software entitled

  1. A review of the two major regulatory pathways for non-proprietary low-molecular-weight heparins.

    Science.gov (United States)

    Ofosu, Frederick A

    2012-02-01

    With the expiry or pending expiry of originator low-molecular-weight heparin (LMWH) patents, pharmaceutical companies have invested in developing non-proprietary versions of LMWHs. LMWHs are manufactured by depolymerising highly purified unfractionated heparin. In contrast to traditional synthetic drugs with well-defined chemical structures, LMWHs contain complex oligosaccharide mixtures and the different manufacturing processes for LMWHs add to the heterogeneity in their physicochemical properties such that the European Medicines Agency (EMA) and the US Food and Drug Administration (FDA) consider existing originator LMWHs to be distinct medicinal entities that are not clinically interchangeable. The FDA views LMWHs as drugs and has approved two non-proprietary (generic) LMWHs, using the Abbreviated New Drug Application pathway. In contrast, the World Health Organization and the EMA view LMWHs as biological medicines. Therefore, the EMA and also the Scientific and Standardization Subcommittee on Anticoagulation of the International Society on Thrombosis and Haemostasis and the South Asian Society of Atherosclerosis and Thrombosis have all published specific guidelines for assessing non-proprietary (biosimilar) LMWHs. This manuscript reviews why there are two distinct pathways for approving non-proprietary LMWHs. Available literature on non-proprietary LMWHs approved in some jurisdictions is also reviewed in order to assess whether they satisfy the requirements for LMWHs in the three guidance documents. The review also highlights some of the significant difficulties the two pathways pose for manufacturers and an urgent need to develop a consensus governing the manufacture and regulation of non-proprietary LMWHs to make them more widely available.

  2. Auctioning payment entitlements

    DEFF Research Database (Denmark)

    Nielsen, Kurt

    2005-01-01

    Payment entitlements is a new commodity that arises from the new European common agricultural policy. The agricultural subsidies are decoupled from the actual production and replaced by the so-called payment entitlements. A payment entitlement has a farm specific value and may be freely traded....... This paper discusses the complexity of this new market and suggests an auction that simplifies the complexity. The suggested auction allows a buyer to simultaneously bid on all payment entitlements. The prices are found by a tatonnement that monotonically approximates the equilibrium prices for the different...... types of payment entitlements for sale. The auction enhances the competition and efficiency of the market, which is essential for the individual members of the European Union in order for them to receive their entitled subsidies....

  3. Measurement of academic entitlement.

    Science.gov (United States)

    Miller, Brian K

    2013-10-01

    Members of Generation Y, or Millennials, have been accused of being lazy, whiny, pampered, and entitled, particularly in the college classroom. Using an equity theory framework, eight items from a measure of work entitlement were adapted to measure academic entitlement in a university setting in three independent samples. In Study 1 (n = 229), confirmatory factor analyses indicated good model fit to a unidimensional structure for the data. In Study 2 (n = 200), the questionnaire predicted unique variance in university satisfaction beyond two more general measures of dispositional entitlement. In Study 3 (n = 161), the measure predicted unique variance in perceptions of grade fairness beyond that which was predicted by another measure of academic entitlement. This analysis provides evidence of discriminant, convergent, incremental, concurrent criterion-related, and construct validity for the Academic Equity Preference Questionnaire.

  4. The Terminology of the Modern English Non-proprietary Metaphor Discussion%现代英语专有名词非专有化的隐喻性刍议

    Institute of Scientific and Technical Information of China (English)

    潘若波

    2012-01-01

    Discuss the non-proprietary of English proper noun and semantic association with the culture, points out that non-proprietary of English proper noun plays a positive role in the aspects of enriching the modern English vocabulary, enhancing the cultural connotation and grasping the English language in the context.%探析实际语言运用中英语专有名词非专有化的联想语义所蕴含的文化寓意对充实现代英语词汇,正确理解和把握其在语言具体语境中的得体运用,增强英语语言的文化内涵具有重要意义。

  5. Mentoring and Protege Narcissistic Entitlement

    Science.gov (United States)

    Allen, Tammy D.; Johnson, Hazel-Anne M.; Xu, Xian; Biga, Andrew; Rodopman, Ozgun B.; Ottinot, Raymond C.

    2009-01-01

    The relationship between protege narcissistic entitlement and protege mentoring outcomes is examined among a total sample of 132 proteges employed in a variety of settings. Narcissistic entitlement (NE) refers to a dispositional variable that reflects preoccupation with the expectation of special and preferential treatment from others. Results…

  6. Entitlement Management: Ready to Enter the IdM Mainstream

    Science.gov (United States)

    Gebel, Gerry; Wang, Alice

    Externalizing authorization processing from business applications has been a goal for architects and developers for many years. Recent compliance demands for more granular access control and policy transparency have increased the urgency to adopt an architectural model where authorization and entitlement management are consumed as a service rather than embedded within business applications. Major software vendors, such as Microsoft, Oracle, and SAP, are making significant steps to separate IdM functionality, including entitlement management from application logic. The market has also responded with a plethora of products that provide entitlement management and authorization functionality for commercial or custom-built application environments. Finally, the Extensible Access Control Markup Language (XACML) has emerged as the consensus authorization standard being supported by a growing number of IT and application vendors. Collectively, these forces form the basis of a nascent IdM market segment referred to as entitlement management.

  7. Predicting Academic Entitlement in Undergraduates

    Science.gov (United States)

    Sohr-Preston, Sara; Boswell, Stefanie S.

    2015-01-01

    Academic entitlement (AE) is a common source of frustration for college personnel. This investigation examined predictors (self-concept, academic dishonesty, locus of control, and family functioning) of AE in male and female college students. Academic dishonesty and the interaction between locus of control and family functioning significantly…

  8. Software Review.

    Science.gov (United States)

    McGrath, Diane, Ed.

    1989-01-01

    Reviewed is a computer software package entitled "Audubon Wildlife Adventures: Grizzly Bears" for Apple II and IBM microcomputers. Included are availability, hardware requirements, cost, and a description of the program. The murder-mystery flavor of the program is stressed in this program that focuses on illegal hunting and game management. (CW)

  9. Statistical Measurement of Pension Entitlements

    Directory of Open Access Journals (Sweden)

    Jaroslav Sixta

    2016-06-01

    Full Text Available The paper deals with macroeconomic estimates of the impact of population ageing. It shows that the optimal choice of pension system is not a crucial issue. The main emphasis should be put on demographic and economic parameters influencing significantly the share of retirement pensions in our society. Presented approach is based on so-called pension schemes expressing discounted pension entitlements to 2014. It shows the liabilities to current and future pensioners for both men and women aged over 20 years. We present this model in three variants and illustrate its sensitivity to input parameters. This approach allows us to estimate the share of pension liabilities in gross domestic product that accounts for about 230% according to generally recommended approach. Pension entitlements represent a modern topic to be implemented in 2017 in national accounts. Pros and cons of this modern approach are discussed within our paper.

  10. 38 CFR 21.9560 - Entitlement charges.

    Science.gov (United States)

    2010-07-01

    ...) VOCATIONAL REHABILITATION AND EDUCATION Post-9/11 GI Bill Entitlement § 21.9560 Entitlement charges. (a... the normal term, quarter, or semester if the individual is enrolled for the entire term, quarter,...

  11. 38 CFR 21.7076 - Entitlement charges.

    Science.gov (United States)

    2010-07-01

    ... Bill-Active Duty) Entitlement § 21.7076 Entitlement charges. (a) Overview. VA will make charges against... part of the normal term, quarter or semester, if the veteran or servicemember is enrolled for...

  12. "IBSAR" Software 4.0

    Directory of Open Access Journals (Sweden)

    2004-06-01

    Full Text Available A review for Arabic software entitled "IBSAR" software assigned to help blinds in usage of the computer, the software pronounces the commands and the contents of screens and applications browsed by users, this review includes general introduction about the software, the components and commands of the software , system requirements , and its functions with Windows operating system and Microsoft Word.

  13. 5 CFR 630.1203 - Leave entitlement.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Leave entitlement. 630.1203 Section 630.1203 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS ABSENCE AND LEAVE Family and Medical Leave § 630.1203 Leave entitlement. (a) An employee shall be entitled to...

  14. An Organizational Perspective on Free and Open Source Software Development

    DEFF Research Database (Denmark)

    Vujovic, Sladjana; Ulhøi, John Parm

    2006-01-01

    The traditional model of innovation, the restricted/close source (R/CS) model, is based on proprietary knowledge and private model of production. A fundamental different one, the open source model is based on non-proprietary knowledge and non-economic motives. Moreover, between the two......, there are various combinations or hybrids, in the following referred to as free/open source-based (F/OS-based) agency. In the discussions, practical examples from software production are included. In conclusion, the paper identifies avenues for future research as well as important managerial and policy implications....

  15. 38 CFR 3.657 - Surviving spouse becomes entitled, or entitlement terminates.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Surviving spouse becomes... Adjustments and Resumptions § 3.657 Surviving spouse becomes entitled, or entitlement terminates. Where a surviving spouse establishes entitlement to pension, compensation, or dependency and indemnity...

  16. 42 CFR 407.27 - Termination of entitlement: Individual enrollment.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES MEDICARE PROGRAM SUPPLEMENTARY MEDICAL INSURANCE (SMI) ENROLLMENT AND ENTITLEMENT Individual Enrollment and Entitlement for SMI § 407.27 Termination of entitlement: Individual enrollment. An individual's entitlement will terminate for any of the following reasons: (a) Death. Entitlement to SMI...

  17. Academic Entitlement and Academic Performance in Graduating Pharmacy Students

    OpenAIRE

    Jeffres, Meghan N.; Barclay, Sean M.; Stolte, Scott K.

    2014-01-01

    Objectives. To determine a measurable definition of academic entitlement, measure academic entitlement in graduating doctor of pharmacy (PharmD) students, and compare the academic performance between students identified as more or less academically entitled.

  18. 5 CFR 1653.4 - Calculating entitlements.

    Science.gov (United States)

    2010-01-01

    ... PROCESSES AFFECTING THRIFT SAVINGS PLAN ACCOUNTS Retirement Benefits Court Orders § 1653.4 Calculating... purchased as of the effective date; and (iii) Multiplying the price per share as of the payment date by the... estimate the amount of a payee's entitlement when it prepares the court order decision letter and will...

  19. Are Youths' Feelings of Entitlement Always "Bad"?: Evidence for a Distinction between Exploitive and Non-Exploitive Dimensions of Entitlement

    Science.gov (United States)

    Lessard, Jared; Greenberger, Ellen; Chen, Chuansheng; Farruggia, Susan

    2011-01-01

    Previous personality research (e.g., Campbell et al., 2004) has described the sense of entitlement as an unifactorial construct. In this study, we examined characteristics of two potential facets of entitlement: exploitive entitlement, characterized by exploitive interactions and expectations of special treatment, and non-exploitive entitlement,…

  20. 77 FR 50722 - Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

    Science.gov (United States)

    2012-08-22

    ... COMMISSION Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear Power Plants... regulatory guide (DG), DG-1208, ``Software Unit Testing for Digital Computer Software used in Safety Systems... entitled ``Software Unit Testing for Digital Computer Software Used in Safety Systems of Nuclear...

  1. Rights as entitlements and rights as claims

    Directory of Open Access Journals (Sweden)

    Azevedo, Marco Antônio Oliveira de

    2010-01-01

    Full Text Available Há pelo menos dois registros diferentes sobre o significado de “direitos”. Segundo um deles, os direitos são relações entre dois termos: uma pessoa e um bem; para o outro, os direitos são relações entre três termos: um indivíduo, uma pessoa e uma ação ou algo. Os registros são diferentes, mas não são totalmente incompatíveis. De acordo com a interpretação de direitos como entitlements, trata-se de direitos morais ou legais, ou seja, as relações de ordem moral ou jurídica das pessoas com bens (de benefícios concedidos a pessoas por uma lei humana, moral ou legal. Como uma espécie de direitos, os direitos humanos são vistos como direitos (entitlements das pessoas ou dos indivíduos a bens essenciais, dos quais podem-se inferir reivindicações (claims contra outras pessoas ou contra governos e representantes. Falamos sobre direitos humanos geralmente desta forma. Mas de acordo com o outro registro, os direitos em sentido próprio têm que ser interpretados como claims. Neste artigo, pretendo apresentar alguns argumentos em favor da vantagem de expor todos os enunciados significativos dos direitos como entitlements em termos explícitos de claims

  2. Entitlement and organizational behaviors: the moderating role of narcissism

    Directory of Open Access Journals (Sweden)

    Agata Szalkowska

    2015-10-01

    Full Text Available Background The purpose of this study was to investigate the relationship between psychological entitlement (active, passive, and revenge, narcissism and two types of organizational behaviors in employees. Interactions between narcissism and psychological entitlement as predictors of organizational citizenship behaviors (OCB and counterproductive work behaviors (CWB were explored. Predictors were analyzed in an effort to determine whether psychological entitlement plays a more destructive role among narcissistic employees than among non-narcissistic ones and whether the effects of narcissism on OCB and CWB are mediated by entitlement. Participants and procedure Data were obtained from 100 employees (34% men aged 22 to 59 years (M = 37.00, SD = 9.30 from public and private companies. Participants were asked to complete the Organizational Citizenship Behavior Scale (OCBS, the Counterproductive Organizational Behaviors Scale (COBS, the Entitlement Questionnaire, and the Narcissistic Personality Inventory (NPI. Results Positive aspects of entitlement were positively associated with OCB only among narcissistic employees, and active entitlement mediated the effects of narcissism on CWB. Active entitlement was negatively related to CWB. Negative aspects of entitlement were negatively related to OCB and unrelated to CWB. Conclusions This study provides evidence for positive (healthy aspects of entitlement for organizations. The unexpected interaction between narcissism and entitlement in predicting higher levels of OCB suggests that among narcissistic employees, healthy aspects of entitlement are desirable and profitable for an organization. Psychological entitlement was observed to be an important predictor of organizational behaviors beyond narcissism itself.

  3. Academic entitlement and academic performance in graduating pharmacy students.

    Science.gov (United States)

    Jeffres, Meghan N; Barclay, Sean M; Stolte, Scott K

    2014-08-15

    To determine a measurable definition of academic entitlement, measure academic entitlement in graduating doctor of pharmacy (PharmD) students, and compare the academic performance between students identified as more or less academically entitled. Graduating students at a private health sciences institution were asked to complete an electronic survey instrument that included demographic data, academic performance, and 2 validated academic entitlement instruments. One hundred forty-one of 243 students completed the survey instrument. Fourteen (10%) students scored greater than the median total points possible on 1 or both of the academic entitlement instruments and were categorized as more academically entitled. Less academically entitled students required fewer reassessments and less remediation than more academically entitled students. The highest scoring academic entitlement items related to student perception of what professors should do for them. Graduating pharmacy students with lower levels of academic entitlement were more academically successful than more academically entitled students. Moving from an expert opinion approach to evidence-based decision-making in the area of academic entitlement will allow pharmacy educators to identify interventions that will decrease academic entitlement and increase academic success in pharmacy students.

  4. 42 CFR 407.25 - Beginning of entitlement: Individual enrollment.

    Science.gov (United States)

    2010-10-01

    ... HUMAN SERVICES MEDICARE PROGRAM SUPPLEMENTARY MEDICAL INSURANCE (SMI) ENROLLMENT AND ENTITLEMENT Individual Enrollment and Entitlement for SMI § 407.25 Beginning of entitlement: Individual enrollment. The following apply whether an individual is self-enrolled or automatically enrolled in SMI: (a)...

  5. 42 CFR 406.28 - End of entitlement.

    Science.gov (United States)

    2010-10-01

    ... HOSPITAL INSURANCE ELIGIBILITY AND ENTITLEMENT Premium Hospital Insurance § 406.28 End of entitlement. Any of the following actions or events ends entitlement to premium hospital insurance: (a) Filing of... written notice that he or she no longer wishes to participate in the premium hospital insurance program...

  6. 42 CFR 31.11 - Persons entitled to treatment.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.11 Section 31.11... § 31.11 Persons entitled to treatment. To the extent and under the circumstances prescribed in this part, the following persons shall be entitled to medical, surgical, and dental treatment...

  7. 20 CFR 725.218 - Conditions of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Conditions of entitlement; child. 725.218... Conditions of entitlement; child. (a) An individual is entitled to benefits where he or she meets the... the child of a deceased miner who: (1) Was receiving benefits under section 415 or part C of title...

  8. 20 CFR 410.213 - Duration of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Duration of entitlement; child. 410.213...; Filing of Claims and Evidence § 410.213 Duration of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning with the first month in which all of the conditions...

  9. 20 CFR 410.212 - Conditions of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Conditions of entitlement; child. 410.212...; Filing of Claims and Evidence § 410.212 Conditions of entitlement; child. (a) An individual is entitled to benefits if such individual: (1) Is the child or stepchild (see § 410.330) of (i) a deceased...

  10. 20 CFR 725.219 - Duration of entitlement; child.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Duration of entitlement; child. 725.219... of entitlement; child. (a) An individual is entitled to benefits as a child for each month beginning... month in which any one of the following events first occurs: (1) The child dies; (2) The child...

  11. Entitlement and organizational behaviors: the moderating role of narcissism

    OpenAIRE

    Agata Szalkowska; Magdalena Żemojtel-Piotrowska; Amanda Clinton

    2015-01-01

    Background The purpose of this study was to investigate the relationship between psychological entitlement (active, passive, and revenge), narcissism and two types of organizational behaviors in employees. Interactions between narcissism and psychological entitlement as predictors of organizational citizenship behaviors (OCB) and counterproductive work behaviors (CWB) were explored. Predictors were analyzed in an effort to determine whether psychological entitlement plays a more destruct...

  12. "I Bought My Degree, Now I Want My Job!" Is Academic Entitlement Related to Prospective Workplace Entitlement?

    Science.gov (United States)

    Peirone, Amy; Maticka-Tyndale, Eleanor

    2017-01-01

    Academic entitlement, a term that defines students' expectations of academic success independent of performance, has been linked with a number of maladaptive behaviors. This study examined the potential relationship between academic entitlement and prospective workplace entitlement in a sample of Canadian students (N=1024) using an online survey.…

  13. Entitlement in codependency: developmental and therapeutic considerations.

    Science.gov (United States)

    Farmer, S A

    1999-01-01

    The purpose of this article is to explore the way in which narcissism is manifest within codependent individuals. Although codependent clients present themselves as needy, self-effacing, and overly deferent to others, many of their behavior patterns are actually a manifestation of a subtle form of narcissistic entitlement. Codependents see others as extensions of themselves, rather than as individuals in their own right, and frequently have unrealistic expectations about their relationships. Successful treatment must include an understanding of the developmental underpinnings of their symptoms. Effective psychotherapy also involves maintaining a difficult balance-holding out the expectation of mature adult functioning while simultaneously understanding and accepting clients' initial inability to relate in such a fashion.

  14. Can a sense of entitlement increase stealing?

    DEFF Research Database (Denmark)

    Gravert, Christina Annette

    was asked to roll a die to determine their payoff, while the other group had three minutes to find matching numbers in a matrix task. Participants then paid themselves unobserved by the experimenter. I find that the participants who earned their payoff according to performance were three times more likely...... to take the (undeserved) maximum payoff than the participants in the random payment scheme. In contrast to previous findings in the cheating literature, stealing is an all-or-nothing decision rather than a trade-off between a slightly higher payoff and the desire to keep ones moral values intact....... The results support the theory that unethical behavior is increased by a sense of entitlement, which is more pronounced when wealth depends on performance than on the roll of a die....

  15. Feeling entitled to more: ostracism increases dishonest behavior.

    Science.gov (United States)

    Poon, Kai-Tak; Chen, Zhansheng; Dewall, C Nathan

    2013-09-01

    Five experiments tested whether ostracism increases dishonesty through increased feelings of entitlement. Compared with included and control participants, ostracized participants indicated higher levels of dishonest intentions (Experiments 1-3) and cheated more to take undeserved money in a behavioral task (Experiments 4 and 5). In addition, increased feelings of entitlement mediated the effect of ostracism on dishonesty (Experiments 3-5). Framing ostracism as beneficial weakened the connection between ostracism, entitlement, and dishonest behavior (Experiment 5). Together, these findings highlight the significance of entitlement in explaining when and why ostracism increases dishonest behavior and how to weaken this relationship.

  16. New Adolescent Money Attitude Scales: Entitlement and Conscientiousness

    Science.gov (United States)

    Beutler, Ivan F.; Gudmunson, Clinton G.

    2012-01-01

    The development of two new money-attitude scales measuring entitlement and conscientiousness in adolescents are described. The scales were developed through student and focus group input and from a review of literature on entitlement and conscientiousness as a new adolescent financial education curriculum was being developed. The findings from 265…

  17. 42 CFR 407.4 - Basic requirements for entitlement.

    Science.gov (United States)

    2010-10-01

    ... MEDICARE PROGRAM SUPPLEMENTARY MEDICAL INSURANCE (SMI) ENROLLMENT AND ENTITLEMENT General Provisions § 407... entitled to SMI: (1) Eligibility. The individual must meet the eligibility requirements specified in § 407.10(a). (2) Enrollment. The individual must enroll for SMI, or must be enrolled by a State under a...

  18. Academic Entitlement and Its Relationship with Perception of Cheating Ethics

    Science.gov (United States)

    Elias, Rafik Z.

    2017-01-01

    Cheating is an epidemic in higher education. The author examined the psychological variable of academic entitlement and its relationship with the ethical perception of cheating using a sample of business students. Contrary to some previous research, the author found that millennials were only slightly more academically entitled than students from…

  19. 42 CFR 31.2 - Persons entitled to treatment.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Persons entitled to treatment. 31.2 Section 31.2... Public Health Service § 31.2 Persons entitled to treatment. To the extent and under the circumstances... treatment and hospitalization by the Service: (a) Coast Guard. (1) Commissioned officers, chief...

  20. 5 CFR 630.1210 - Greater leave entitlements.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Greater leave entitlements. 630.1210 Section 630.1210 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS ABSENCE AND LEAVE Family and Medical Leave § 630.1210 Greater leave entitlements. (a) An agency shall...

  1. Attachment, Entitlement, and the Impostor Phenomenon in Female Graduate Students

    Science.gov (United States)

    Gibson-Beverly, Gina; Schwartz, Jonathan R.

    2008-01-01

    This study examined the utility of attachment and entitlement as predictors of the impostor phenomenon in female graduate students. Findings suggested that individuals with high levels of self-reliance/self-assurance entitlement are able to associate positive feedback with stable internal attributes. Those with anxious attachment and narcissistic…

  2. The flexible fairness: equality, earned entitlement, and self-interest.

    Science.gov (United States)

    Feng, Chunliang; Luo, Yi; Gu, Ruolei; Broster, Lucas S; Shen, Xueyi; Tian, Tengxiang; Luo, Yue-Jia; Krueger, Frank

    2013-01-01

    The current study explored whether earned entitlement modulated the perception of fairness in three experiments. A preliminary resource earning task was added before players decided how to allocate the resource they jointly earned. Participants' decision in allocation, their responses to equal or unequal offers, whether advantageous or disadvantageous, and subjective ratings of fairness were all assessed in the current study. Behavioral results revealed that participants proposed more generous offers and showed enhanced tolerance to disadvantageous unequal offers from others when they performed worse than their presumed "partners," while the reverse was true in the better-performance condition. The subjective ratings also indicated the effect of earned entitlement, such that worse performance was associated with higher perceived feelings of fairness for disadvantageous unequal offers, while better performance was associated with higher feelings of fairness for advantageous unequal offers. Equal offers were considered "fair" only when earned entitlement was even between two parties. In sum, the perception of fairness is modulated by an integration of egalitarian motivation and entitlement. In addition to justice principles, participants were also motivated by self-interest, such that participants placed more weight on entitlement in the better-performance condition than in the worse-performance condition. These results imply that earned entitlement is evaluated in a self-serving way.

  3. Common Data Acquisition Systems (DAS) Software Development for Rocket Propulsion Test (RPT) Test Facilities

    Science.gov (United States)

    Hebert, Phillip W., Sr.; Davis, Dawn M.; Turowski, Mark P.; Holladay, Wendy T.; Hughes, Mark S.

    2012-01-01

    The advent of the commercial space launch industry and NASA's more recent resumption of operation of Stennis Space Center's large test facilities after thirty years of contractor control resulted in a need for a non-proprietary data acquisition systems (DAS) software to support government and commercial testing. The software is designed for modularity and adaptability to minimize the software development effort for current and future data systems. An additional benefit of the software's architecture is its ability to easily migrate to other testing facilities thus providing future commonality across Stennis. Adapting the software to other Rocket Propulsion Test (RPT) Centers such as MSFC, White Sands, and Plumbrook Station would provide additional commonality and help reduce testing costs for NASA. Ultimately, the software provides the government with unlimited rights and guarantees privacy of data to commercial entities. The project engaged all RPT Centers and NASA's Independent Verification & Validation facility to enhance product quality. The design consists of a translation layer which provides the transparency of the software application layers to underlying hardware regardless of test facility location and a flexible and easily accessible database. This presentation addresses system technical design, issues encountered, and the status of Stennis development and deployment.

  4. The role of on-line communication in open source software development

    DEFF Research Database (Denmark)

    Vujovic, S.; Ulhøi, John Parm

    2004-01-01

    allow parallel development and dynamic online exchanges during the overall innovation process. In conceptualizing online computer-based innovation process in the form of Open Source Software, the paper will borrow from theory on networks and communities of practice, which take into account social...... concludes that online computer-based innovation fundamentally challenges the contemporary way of communication, cooperation and coordination during innovation and product developments. Moreover, it challenges the traditional business model in that it forces the actors involved to move the focus away from......Online computer technologies provide an effective means for communication, cooperation and coordination. In this paper we address the extent innovation based upon non-proprietary knowledge offers the participating actors an interesting alternative for product development. Such an alternative would...

  5. The role of on-line communication in open source software development

    DEFF Research Database (Denmark)

    Vujovic, S.; Ulhøi, John Parm

    2004-01-01

    the innovation itself and upstream in the value chain to identifying new supporting services. In closing the paper addresses motivations of companies to integrate this alternative and non-proprietary way of product development into their proprietary business model. We do this by presenting an example....... concludes that online computer-based innovation fundamentally challenges the contemporary way of communication, cooperation and coordination during innovation and product developments. Moreover, it challenges the traditional business model in that it forces the actors involved to move the focus away from...... allow parallel development and dynamic online exchanges during the overall innovation process. In conceptualizing online computer-based innovation process in the form of Open Source Software, the paper will borrow from theory on networks and communities of practice, which take into account social...

  6. 21 CFR 1306.06 - Persons entitled to fill prescriptions.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Persons entitled to fill prescriptions. 1306.06 Section 1306.06 Food and Drugs DRUG ENFORCEMENT ADMINISTRATION, DEPARTMENT OF JUSTICE PRESCRIPTIONS... either registered individually or employed in a registered pharmacy, a registered central fill pharmacy...

  7. 38 CFR 21.9570 - Transfer of entitlement.

    Science.gov (United States)

    2010-07-01

    ... individual from whom entitlement was transferred. (1) Definitions. Section 21.9505—Definitions. (Authority...) Counseling. (i) Section 21.9580—Counseling; (ii) Section 21.9585—Travel expenses. (Authority: 38 U.S.C. 3319....9745—Reporting fee. (Authority: 38 U.S.C. 3319) (9) Course assessment. Section...

  8. Safe water: an enquiry into water entitlements and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2006-01-01

    Privatisation of water delivery is a human rights issue in two distinct ways. Firstly, it implies an institutional change that will tend to impinge on existing access to water. While basic water entitlements are supposed to be protected by human rights law, this is likely to influence

  9. 75 FR 52619 - Entitlement and Termination Requirements for Stepchildren

    Science.gov (United States)

    2010-08-27

    ...-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... Dependency A stepchild may be entitled to receive Social Security child's benefits based on a stepparent's... eliminate the reference to the ``living with'' dependency standard for child's benefits to stepchildren. We...

  10. Intellectual Freedom and Economic Sufficiency as Educational Entitlements.

    Science.gov (United States)

    Morse, Jane Fowler

    2001-01-01

    Using the theories of John Stuart Mill and Karl Marx, this article supports the educational entitlements of intellectual freedom and economic sufficiency. Explores these issues in reference to their implications for teaching, the teaching profession and its training. Concludes that ideas cannot be controlled by the interests of the dominant class.…

  11. Social policy and entitlements : a proposal for reform

    NARCIS (Netherlands)

    Nentjes, Andries; Meijer, G; Heijman, WJM; VanOphem, JAC; Verstegen, BHJ

    2006-01-01

    Welfare states citizens have entitlements to a variety of social services provided for free or a price far below cost, such as education, health care, social security and housing. Every citizen benefits, but in their present organisation the social services also have major deficiencies: lack of choi

  12. Safe water: an enquiry into water entitlements and human rights

    NARCIS (Netherlands)

    Gaay Fortman, B. de

    2006-01-01

    Privatisation of water delivery is a human rights issue in two distinct ways. Firstly, it implies an institutional change that will tend to impinge on existing access to water. While basic water entitlements are supposed to be protected by human rights law, this is likely to influence implementation

  13. 28 CFR 301.315 - Review of entitlement.

    Science.gov (United States)

    2010-07-01

    ... result in the suspension or denial of all Inmate Accident Compensation benefits until such time as... COMPENSATION Compensation for Work-Related Physical Impairment or Death § 301.315 Review of entitlement. (a) Each monthly compensation recipient shall be required, upon request of the Claims Examiner, to submit...

  14. 20 CFR 61.200 - Entitlement to benefits.

    Science.gov (United States)

    2010-04-01

    ....200 Employees' Benefits OFFICE OF WORKERS' COMPENSATION PROGRAMS, DEPARTMENT OF LABOR COMPENSATION FOR..., Disability or Death § 61.200 Entitlement to benefits. (a) Compensation under section 101(a) of the Act is... utilized by the United States. (3) The person seeking benefits recovers or receives workers' compensation...

  15. Balancing Consistency and Flexibility in Student Training Entitlements: Research Overview

    Science.gov (United States)

    Bowman, Kaye; McKenna, Suzy; Griffin, Tabatha

    2016-01-01

    This research overview summarizes the work undertaken by Kaye Bowman and Suzy McKenna in exploring jurisdictional approaches to the implementation of student entitlements to vocational skills training, a key reform initiative in the National Partnership Agreement on Skills Reform (NPASR) of 2012-16. The overview is a condensed summary of three…

  16. 38 CFR 3.257 - Children; no surviving spouse entitled.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Children; no surviving... and Estate § 3.257 Children; no surviving spouse entitled. Where pension is not payable to a surviving... worth, payments will be made to or for the child or children as if there were no surviving spouse....

  17. Intellectual Freedom and Economic Sufficiency as Educational Entitlements.

    Science.gov (United States)

    Morse, Jane Fowler

    2001-01-01

    Using the theories of John Stuart Mill and Karl Marx, this article supports the educational entitlements of intellectual freedom and economic sufficiency. Explores these issues in reference to their implications for teaching, the teaching profession and its training. Concludes that ideas cannot be controlled by the interests of the dominant class.…

  18. 20 CFR 404.252 - Subsequent entitlement to benefits 12 months or more after entitlement to disability benefits ended.

    Science.gov (United States)

    2010-04-01

    ... or more after entitlement to disability benefits ended. 404.252 Section 404.252 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Special Computation Rules for People Who Had A Period of Disability §...

  19. 20 CFR 404.251 - Subsequent entitlement to benefits less than 12 months after entitlement to disability benefits...

    Science.gov (United States)

    2010-04-01

    ... 12 months after entitlement to disability benefits ended. 404.251 Section 404.251 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Computing Primary Insurance Amounts Special Computation Rules for People Who Had A Period of Disability §...

  20. The South African Astronomical Observatory instrumentation software architecture and the SHOC instruments

    Science.gov (United States)

    van Gend, Carel; Lombaard, Briehan; Sickafoose, Amanda; Whittal, Hamish

    2016-07-01

    Until recently, software for instruments on the smaller telescopes at the South African Astronomical Observatory (SAAO) has not been designed for remote accessibility and frequently has not been developed using modern software best-practice. We describe a software architecture we have implemented for use with new and upgraded instruments at the SAAO. The architecture was designed to allow for multiple components and to be fast, reliable, remotely- operable, support different user interfaces, employ as much non-proprietary software as possible, and to take future-proofing into consideration. Individual component drivers exist as standalone processes, communicating over a network. A controller layer coordinates the various components, and allows a variety of user interfaces to be used. The Sutherland High-speed Optical Cameras (SHOC) instruments incorporate an Andor electron-multiplying CCD camera, a GPS unit for accurate timing and a pair of filter wheels. We have applied the new architecture to the SHOC instruments, with the camera driver developed using Andor's software development kit. We have used this to develop an innovative web-based user-interface to the instrument.

  1. Software engineering

    CERN Document Server

    Sommerville, Ian

    2010-01-01

    The ninth edition of Software Engineering presents a broad perspective of software engineering, focusing on the processes and techniques fundamental to the creation of reliable, software systems. Increased coverage of agile methods and software reuse, along with coverage of 'traditional' plan-driven software engineering, gives readers the most up-to-date view of the field currently available. Practical case studies, a full set of easy-to-access supplements, and extensive web resources make teaching the course easier than ever.

  2. Wealth and the inflated self: class, entitlement, and narcissism.

    Science.gov (United States)

    Piff, Paul K

    2014-01-01

    Americans may be more narcissistic now than ever, but narcissism is not evenly distributed across social strata. Five studies demonstrated that higher social class is associated with increased entitlement and narcissism. Upper-class individuals reported greater psychological entitlement (Studies 1a, 1b, and 2) and narcissistic personality tendencies (Study 2), and they were more likely to behave in a narcissistic fashion by opting to look at themselves in a mirror (Study 3). Finally, inducing egalitarian values in upper-class participants decreased their narcissism to a level on par with their lower-class peers (Study 4). These findings offer novel evidence regarding the influence of social class on the self and highlight the importance of social stratification to understanding basic psychological processes.

  3. Common Data Acquisition Systems (DAS) Software Development for Rocket Propulsion Test (RPT) Test Facilities - A General Overview

    Science.gov (United States)

    Hebert, Phillip W., Sr.; Hughes, Mark S.; Davis, Dawn M.; Turowski, Mark P.; Holladay, Wendy T.; Marshall, PeggL.; Duncan, Michael E.; Morris, Jon A.; Franzl, Richard W.

    2012-01-01

    The advent of the commercial space launch industry and NASA's more recent resumption of operation of Stennis Space Center's large test facilities after thirty years of contractor control resulted in a need for a non-proprietary data acquisition system (DAS) software to support government and commercial testing. The software is designed for modularity and adaptability to minimize the software development effort for current and future data systems. An additional benefit of the software's architecture is its ability to easily migrate to other testing facilities thus providing future commonality across Stennis. Adapting the software to other Rocket Propulsion Test (RPT) Centers such as MSFC, White Sands, and Plumbrook Station would provide additional commonality and help reduce testing costs for NASA. Ultimately, the software provides the government with unlimited rights and guarantees privacy of data to commercial entities. The project engaged all RPT Centers and NASA's Independent Verification & Validation facility to enhance product quality. The design consists of a translation layer which provides the transparency of the software application layers to underlying hardware regardless of test facility location and a flexible and easily accessible database. This presentation addresses system technical design, issues encountered, and the status of Stennis' development and deployment.

  4. Approaching Corporate Social Responsibility through Kenneth Burke's Notions of Terministic Screens and Entitlement

    DEFF Research Database (Denmark)

    Kampf, Constance

    Approaching Corporate Social Responsibility through Kenneth Burke's Notions of Terministic Screens and Entitlement Kenneth Burke brings together the function of rhetoric as both a constitutive and interpretive process through his notions of terministic screens and entitlement.  Terministic screen...

  5. SOFTWARE OPEN SOURCE, SOFTWARE GRATIS?

    Directory of Open Access Journals (Sweden)

    Nur Aini Rakhmawati

    2006-01-01

    Full Text Available Normal 0 false false false IN X-NONE X-NONE MicrosoftInternetExplorer4 Berlakunya Undang – undang Hak Atas Kekayaan Intelektual (HAKI, memunculkan suatu alternatif baru untuk menggunakan software open source. Penggunaan software open source menyebar seiring dengan isu global pada Information Communication Technology (ICT saat ini. Beberapa organisasi dan perusahaan mulai menjadikan software open source sebagai pertimbangan. Banyak konsep mengenai software open source ini. Mulai dari software yang gratis sampai software tidak berlisensi. Tidak sepenuhnya isu software open source benar, untuk itu perlu dikenalkan konsep software open source mulai dari sejarah, lisensi dan bagaimana cara memilih lisensi, serta pertimbangan dalam memilih software open source yang ada. Kata kunci :Lisensi, Open Source, HAKI

  6. Software Reviews.

    Science.gov (United States)

    Smith, Richard L., Ed.

    1985-01-01

    Reviews software packages by providing extensive descriptions and discussions of their strengths and weaknesses. Software reviewed include (1) "VISIFROG: Vertebrate Anatomy" (grade seven-adult); (2) "Fraction Bars Computer Program" (grades three to six) and (3) four telecommunications utilities. (JN)

  7. 38 CFR 21.79 - Determining entitlement usage under Chapter 31.

    Science.gov (United States)

    2010-07-01

    ... Employment Under 38 U.S.C. Chapter 31 Duration of Rehabilitation Programs § 21.79 Determining entitlement... rehabilitation program for 1 day should be charged 1 day of entitlement. The determination of entitlement is based upon the rate at which the veteran pursues his or her rehabilitation program. The rate of...

  8. 20 CFR 404.1911 - Effects of a totalization agreement on entitlement to hospital insurance benefits.

    Science.gov (United States)

    2010-04-01

    ... entitlement to hospital insurance benefits. 404.1911 Section 404.1911 Employees' Benefits SOCIAL SECURITY... Provisions § 404.1911 Effects of a totalization agreement on entitlement to hospital insurance benefits. A person may not become entitled to hospital insurance benefits under section 226 or section 226A of the...

  9. Self-Compassion as a Predictor of Psychological Entitlement in Turkish University Students

    Science.gov (United States)

    Sahranç, Ümit

    2015-01-01

    The purpose of this study is to examine the predictive role of self-compassion on psychological entitlement. Participants were 331 university students (205 women, 126 men, M age = 20.5 years.). In this study, the Self-compassion Scale and the Psychological Entitlement Scale were used to assess self-compassion and psychological entitlement. The…

  10. 20 CFR 404.330 - Who is entitled to wife's or husband's benefits.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Who is entitled to wife's or husband's...'s or husband's benefits. You are entitled to benefits as the wife or husband of an insured person who is entitled to old-age or disability benefits if— (a) You are the insured's wife or husband...

  11. 38 CFR 21.7075 - Entitlement to tuition assistance top-up.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Entitlement to tuition assistance top-up. 21.7075 Section 21.7075 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS... Program (Montgomery GI Bill-Active Duty) Entitlement § 21.7075 Entitlement to tuition assistance...

  12. 20 CFR 216.91 - Entitlement as an employee and spouse, divorced spouse, or survivor.

    Science.gov (United States)

    2010-04-01

    ..., divorced spouse, or survivor. 216.91 Section 216.91 Employees' Benefits RAILROAD RETIREMENT BOARD... § 216.91 Entitlement as an employee and spouse, divorced spouse, or survivor. (a) General. If an individual is entitled to an annuity as a spouse, divorced spouse or survivor, and is also entitled to...

  13. 20 CFR 228.22 - Entitlement to more than one survivor annuity.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Entitlement to more than one survivor annuity... RETIREMENT ACT COMPUTATION OF SURVIVOR ANNUITIES The Tier I Annuity Component § 228.22 Entitlement to more than one survivor annuity. If an individual is entitled to more than one survivor annuity, only...

  14. 38 CFR 10.35 - Claim of mother entitled by reason of unmarried status.

    Science.gov (United States)

    2010-07-01

    ... entitled by reason of unmarried status. Claim of a mother for the benefits to which she may be entitled by... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Claim of mother entitled by reason of unmarried status. 10.35 Section 10.35 Pensions, Bonuses, and Veterans' Relief...

  15. Software reliability

    CERN Document Server

    Bendell, A

    1986-01-01

    Software Reliability reviews some fundamental issues of software reliability as well as the techniques, models, and metrics used to predict the reliability of software. Topics covered include fault avoidance, fault removal, and fault tolerance, along with statistical methods for the objective assessment of predictive accuracy. Development cost models and life-cycle cost models are also discussed. This book is divided into eight sections and begins with a chapter on adaptive modeling used to predict software reliability, followed by a discussion on failure rate in software reliability growth mo

  16. Computer software.

    Science.gov (United States)

    Rosenthal, L E

    1986-10-01

    Software is the component in a computer system that permits the hardware to perform the various functions that a computer system is capable of doing. The history of software and its development can be traced to the early nineteenth century. All computer systems are designed to utilize the "stored program concept" as first developed by Charles Babbage in the 1850s. The concept was lost until the mid-1940s, when modern computers made their appearance. Today, because of the complex and myriad tasks that a computer system can perform, there has been a differentiation of types of software. There is software designed to perform specific business applications. There is software that controls the overall operation of a computer system. And there is software that is designed to carry out specialized tasks. Regardless of types, software is the most critical component of any computer system. Without it, all one has is a collection of circuits, transistors, and silicone chips.

  17. Parent training in nonviolent resistance for adult entitled dependence.

    Science.gov (United States)

    Lebowitz, Eli; Dolberger, Dan; Nortov, Efi; Omer, Haim

    2012-03-01

    "Adult entitled dependence" is a condition characterized by the extreme dependence of grown children on their family and by levels of dysfunction, seemingly excessive in light of their apparent capacity to function. The family and the dependent adult become involved in an interaction in which the very attempts to alleviate the problem may aggravate it. Parent-training in nonviolent resistance (NVR) is an intervention that has been shown to be helpful to parents of behaviorally disturbed youth. Parent training in NVR offers parents means to shift away from a stance of helplessness toward realistic goals that are accomplishable without the collaboration of their offspring. We report on the parents of 27 entitled dependent grown children who participated in parent training in NVR. Additionally, we present 2 detailed case studies that exemplify the problem and the therapeutic process. Before treatment, the dependent adults were not working or studying, drew heavily on parental services (financial or otherwise), and were resistant to parental attempts to change the situation. Most parents succeeded in overcoming their helplessness and reducing the provision of parental services. In a considerable proportion of cases, the grown children started working or studying or moved to independent lodgings. © FPI, Inc.

  18. Data collection procedures for the Software Engineering Laboratory (SEL) database

    Science.gov (United States)

    Heller, Gerard; Valett, Jon; Wild, Mary

    1992-01-01

    This document is a guidebook to collecting software engineering data on software development and maintenance efforts, as practiced in the Software Engineering Laboratory (SEL). It supersedes the document entitled Data Collection Procedures for the Rehosted SEL Database, number SEL-87-008 in the SEL series, which was published in October 1987. It presents procedures to be followed on software development and maintenance projects in the Flight Dynamics Division (FDD) of Goddard Space Flight Center (GSFC) for collecting data in support of SEL software engineering research activities. These procedures include detailed instructions for the completion and submission of SEL data collection forms.

  19. Space-Based Reconfigurable Software Defined Radio Test Bed Aboard International Space Station

    Science.gov (United States)

    Reinhart, Richard C.; Lux, James P.

    2014-01-01

    The National Aeronautical and Space Administration (NASA) recently launched a new software defined radio research test bed to the International Space Station. The test bed, sponsored by the Space Communications and Navigation (SCaN) Office within NASA is referred to as the SCaN Testbed. The SCaN Testbed is a highly capable communications system, composed of three software defined radios, integrated into a flight system, and mounted to the truss of the International Space Station. Software defined radios offer the future promise of in-flight reconfigurability, autonomy, and eventually cognitive operation. The adoption of software defined radios offers space missions a new way to develop and operate space transceivers for communications and navigation. Reconfigurable or software defined radios with communications and navigation functions implemented in software or VHDL (Very High Speed Hardware Description Language) provide the capability to change the functionality of the radio during development or after launch. The ability to change the operating characteristics of a radio through software once deployed to space offers the flexibility to adapt to new science opportunities, recover from anomalies within the science payload or communication system, and potentially reduce development cost and risk by adapting generic space platforms to meet specific mission requirements. The software defined radios on the SCaN Testbed are each compliant to NASA's Space Telecommunications Radio System (STRS) Architecture. The STRS Architecture is an open, non-proprietary architecture that defines interfaces for the connections between radio components. It provides an operating environment to abstract the communication waveform application from the underlying platform specific hardware such as digital-to-analog converters, analog-to-digital converters, oscillators, RF attenuators, automatic gain control circuits, FPGAs, general-purpose processors, etc. and the interconnections among

  20. Software piracy

    OpenAIRE

    Kráčmer, Stanislav

    2011-01-01

    The objective of the present thesis is to clarify the term of software piracy and to determine responsibility of individual entities as to actual realization of software piracy. First, the thesis focuses on a computer programme, causes, realization and pitfalls of its inclusion under copyright protection. Subsequently, it observes methods of legal usage of a computer programme. This is the point of departure for the following attempt to define software piracy, accompanied with methods of actu...

  1. Original article Entitlement and subjective well-being: a three-nations study

    Directory of Open Access Journals (Sweden)

    Magdalena Żemojtel-Piotrowska

    2015-03-01

    Full Text Available Background The current study investigated the role of three facets of entitlement (active, passive and revenge in various forms of subjective well-being (SWB: hedonistic and two facets of eudaimonic well-being (social and psychological. Social well-being was based on Keyes’ model (1998 and psychological well-being on Ryff’s model (1989. Participants and procedure The study was performed in three nations (Poland, Puerto Rico and Vietnam on student samples (Poland, n = 245, Vietnam, n = 115, and Puerto Rico, n = 300. To assess entitlement level the Entitlement Questionnaire was used. The level of hedonistic well-being was measured with the Satisfaction with Life Scale (SWLS and the Positive and Negative Affect Schedule (PANAS, and eudaimonic well-being by the Mental Health Continuum–Short Form (MHC-SF. Results Active entitlement was positively related to all aspects of SWB. Revenge entitlement was negatively related to hedonistic and psychological SWB in all samples and negatively related to social well-being only in Poland. Passive entitlement was unrelated to SWB. Conclusions The current study shows cross-cultural similarities in relationships of entitlement with hedonistic and psychological well-being and cross-cultural differences in the relationship of entitlement with social well-being. Additionally, the study indicates positive meaning of healthy aspects of entitlement for subjective well-being and negative meaning of dysfunctional aspects of entitlement for subjective well-being.

  2. Software engineering

    CERN Document Server

    Sommerville, Ian

    2016-01-01

    For courses in computer science and software engineering The Fundamental Practice of Software Engineering Software Engineering introduces readers to the overwhelmingly important subject of software programming and development. In the past few years, computer systems have come to dominate not just our technological growth, but the foundations of our world's major industries. This text seeks to lay out the fundamental concepts of this huge and continually growing subject area in a clear and comprehensive manner. The Tenth Edition contains new information that highlights various technological updates of recent years, providing readers with highly relevant and current information. Sommerville's experience in system dependability and systems engineering guides the text through a traditional plan-based approach that incorporates some novel agile methods. The text strives to teach the innovators of tomorrow how to create software that will make our world a better, safer, and more advanced place to live.

  3. Identifying Two Groups of Entitled Individuals: Cluster Analysis Reveals Emotional Stability and Self-Esteem Distinction.

    Science.gov (United States)

    Crowe, Michael L; LoPilato, Alexander C; Campbell, W Keith; Miller, Joshua D

    2016-12-01

    The present study hypothesized that there exist two distinct groups of entitled individuals: grandiose-entitled, and vulnerable-entitled. Self-report scores of entitlement were collected for 916 individuals using an online platform. Model-based cluster analyses were conducted on the individuals with scores one standard deviation above mean (n = 159) using the five-factor model dimensions as clustering variables. The results support the existence of two groups of entitled individuals categorized as emotionally stable and emotionally vulnerable. The emotionally stable cluster reported emotional stability, high self-esteem, more positive affect, and antisocial behavior. The emotionally vulnerable cluster reported low self-esteem and high levels of neuroticism, disinhibition, conventionality, psychopathy, negative affect, childhood abuse, intrusive parenting, and attachment difficulties. Compared to the control group, both clusters reported being more antagonistic, extraverted, Machiavellian, and narcissistic. These results suggest important differences are missed when simply examining the linear relationships between entitlement and various aspects of its nomological network.

  4. Software requirements

    CERN Document Server

    Wiegers, Karl E

    2003-01-01

    Without formal, verifiable software requirements-and an effective system for managing them-the programs that developers think they've agreed to build often will not be the same products their customers are expecting. In SOFTWARE REQUIREMENTS, Second Edition, requirements engineering authority Karl Wiegers amplifies the best practices presented in his original award-winning text?now a mainstay for anyone participating in the software development process. In this book, you'll discover effective techniques for managing the requirements engineering process all the way through the development cy

  5. 20 CFR 404.331 - Who is entitled to wife's or husband's benefits as a divorced spouse.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Who is entitled to wife's or husband's... is entitled to wife's or husband's benefits as a divorced spouse. You are entitled to wife's or husband's benefits as the divorced wife or divorced husband of an insured person who is entitled to...

  6. Software Innovation

    DEFF Research Database (Denmark)

    Rose, Jeremy

      Innovation is the forgotten key to modern systems development - the element that defines the enterprising engineer, the thriving software firm and the cutting edge software application.  Traditional forms of technical education pay little attention to creativity - often encouraging overly...... rationalistic ways of thinking which stifle the ability to innovate. Professional software developers are often drowned in commercial drudgery and overwhelmed by work pressure and deadlines. The topic that will both ensure success in the market and revitalize their work lives is never addressed. This book sets...... out the new field of software innovation. It organizes the existing scientific research into eight simple heuristics - guiding principles for organizing a system developer's work-life so that it focuses on innovation....

  7. Software Reviews.

    Science.gov (United States)

    Classroom Computer Learning, 1990

    1990-01-01

    Reviewed are three computer software packages including "Martin Luther King, Jr.: Instant Replay of History,""Weeds to Trees," and "The New Print Shop, School Edition." Discussed are hardware requirements, costs, grade levels, availability, emphasis, strengths, and weaknesses. (CW)

  8. Software Reviews.

    Science.gov (United States)

    Wulfson, Stephen, Ed.

    1987-01-01

    Reviews seven computer software programs that can be used in science education programs. Describes courseware which deals with muscles and bones, terminology, classifying animals without backbones, molecular structures, drugs, genetics, and shaping the earth's surface. (TW)

  9. Software Reviews.

    Science.gov (United States)

    Dwyer, Donna; And Others

    1989-01-01

    Reviewed are seven software packages for Apple and IBM computers. Included are: "Toxicology"; "Science Corner: Space Probe"; "Alcohol and Pregnancy"; "Science Tool Kit Plus"; Computer Investigations: Plant Growth"; "Climatrolls"; and "Animal Watch: Whales." (CW)

  10. Reusable Software.

    Science.gov (United States)

    1984-03-01

    overseeing reusable software, the Reusable Software Organization ( RUSO ). This author does not feel at this time that establishment of such a specific...49] have not been accompanied by establishment of RUSO -like activities. There is need, however, for assurance that functions which a RUSO might be...assurance 6. establishment and maintenance of reuse archival facilities and activities. Actual establishment of a RUSO is best dictated by size of the

  11. Software Epistemology

    Science.gov (United States)

    2016-03-01

    comprehensive approach for determining software epistemology which significantly advances the state of the art in automated vulnerability discovery...straightforward. First, internet -based repositories of open source software (e.g., FreeBSD ports, GitHub, SourceForge, etc.) are mined Approved for...the fix delta, we attempted to perform the same process to determine if the firmware release present in an Internet -of-Things (IoT) streaming camera

  12. Scilab software as an alternative low-cost computing in solving the linear equations problem

    Science.gov (United States)

    Agus, Fahrul; Haviluddin

    2017-02-01

    Numerical computation packages are widely used both in teaching and research. These packages consist of license (proprietary) and open source software (non-proprietary). One of the reasons to use the package is a complexity of mathematics function (i.e., linear problems). Also, number of variables in a linear or non-linear function has been increased. The aim of this paper was to reflect on key aspects related to the method, didactics and creative praxis in the teaching of linear equations in higher education. If implemented, it could be contribute to a better learning in mathematics area (i.e., solving simultaneous linear equations) that essential for future engineers. The focus of this study was to introduce an additional numerical computation package of Scilab as an alternative low-cost computing programming. In this paper, Scilab software was proposed some activities that related to the mathematical models. In this experiment, four numerical methods such as Gaussian Elimination, Gauss-Jordan, Inverse Matrix, and Lower-Upper Decomposition (LU) have been implemented. The results of this study showed that a routine or procedure in numerical methods have been created and explored by using Scilab procedures. Then, the routine of numerical method that could be as a teaching material course has exploited.

  13. 76 FR 28819 - NUREG/CR-XXXX, Development of Quantitative Software Reliability Models for Digital Protection...

    Science.gov (United States)

    2011-05-18

    ... COMMISSION NUREG/CR-XXXX, Development of Quantitative Software Reliability Models for Digital Protection... issued for public comment a document entitled: NUREG/CR-XXXX, ``Development of Quantitative Software... development of regulatory guidance for using risk information related to digital systems in the...

  14. 77 FR 39509 - Certain Video Analytics Software, Systems, Components Thereof, and Products Containing Same...

    Science.gov (United States)

    2012-07-03

    ... COMMISSION Certain Video Analytics Software, Systems, Components Thereof, and Products Containing Same... Trade Commission has received a complaint entitled Certain Video Analytics Software, Systems, Components... business hours (8:45 a.m. to 5:15 p.m.) in the Office of the Secretary, U.S. International Trade...

  15. National Utility Financial Statement model (NUFS). Volume III of III: software description. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1981-10-29

    This volume contains a description of the software comprising the National Utility Financial Statement Model (NUFS). This is the third of three volumes describing NUFS provided by ICF Incorporated under contract DEAC-01-79EI-10579. The three volumes are entitled: model overview and description, user's guide, and software guide.

  16. MIAWARE Software

    DEFF Research Database (Denmark)

    Wilkowski, Bartlomiej; Pereira, Oscar N. M.; Dias, Paulo

    2008-01-01

    This article presents MIAWARE, a software for Medical Image Analysis With Automated Reporting Engine, which was designed and developed for doctor/radiologist assistance. It allows to analyze an image stack from computed axial tomography scan of lungs (thorax) and, at the same time, to mark all...... pathologies on images and report their characteristics. The reporting process is normalized - radiologists cannot describe pathological changes with their own words, but can only use some terms from a specific vocabulary set provided by the software. Consequently, a normalized radiological report...... is automatically generated. Furthermore, MIAWARE software is accompanied with an intelligent search engine for medical reports, based on the relations between parts of the lungs. A logical structure of the lungs is introduced to the search algorithm through the specially developed ontology. As a result...

  17. FORUM: Instructional Communication and Millennial Students: Millennial Students in the College Classroom: Adjusting to Academic Entitlement

    Science.gov (United States)

    Goldman, Zachary W.; Martin, Matthew M.

    2016-01-01

    Academic entitlement (AE) refers to the expectation of educational success despite the input of personal effort needed to earn it (Boswell, 2012). Entitled students feel that learning should require minimal work and that difficulties encountered during the learning process should be attributed to instructors, rather than themselves. AE has become…

  18. 12 CFR 1511.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... CORPORATION BOOK-ENTRY PROCEDURE § 1511.4 Creation of Participant's Security Entitlement; security interests... to secure deposits of public money, including without limitation deposits to the Treasury tax and...

  19. 31 CFR 354.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Creation of Participant's Security Entitlement; security interests. 354.4 Section 354.4 Money and Finance: Treasury Regulations Relating to Money... Creation of Participant's Security Entitlement; security interests. (a) A Participant's Security...

  20. 24 CFR 81.93 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Creation of Participant's Security... Procedures § 81.93 Creation of Participant's Security Entitlement; security interests. (a) A Participant's... Entitlement of a Participant in favor of the United States to secure deposits of public money, including...

  1. Permissive Parenting and Mental Health in College Students: Mediating Effects of Academic Entitlement

    Science.gov (United States)

    Barton, Alison L.; Hirsch, Jameson K.

    2016-01-01

    Objective: Student mental health may suffer due to unreasonable expectations associated with academic entitlement; permissive parenting may be one source of these expectations. The authors examined the role of academic entitlement as a mediator of the relationship between permissive parenting and psychological functioning. Participants:…

  2. FORUM: Instructional Communication and Millennial Students: Millennial Students in the College Classroom: Adjusting to Academic Entitlement

    Science.gov (United States)

    Goldman, Zachary W.; Martin, Matthew M.

    2016-01-01

    Academic entitlement (AE) refers to the expectation of educational success despite the input of personal effort needed to earn it (Boswell, 2012). Entitled students feel that learning should require minimal work and that difficulties encountered during the learning process should be attributed to instructors, rather than themselves. AE has become…

  3. Self-Entitled College Students: Contributions of Personality, Parenting, and Motivational Factors

    Science.gov (United States)

    Greenberger, Ellen; Lessard, Jared; Chen, Chuansheng; Farruggia, Susan P.

    2008-01-01

    Anecdotal evidence suggests an increase in entitled attitudes and behaviors of youth in school and college settings. Using a newly developed scale to assess "academic entitlement" (AE), a construct that includes expectations of high grades for modest effort and demanding attitudes towards teachers, this research is the first to investigate the…

  4. 5 CFR 536.304 - Determining an employee's pay retention entitlement.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Determining an employee's pay retention... REGULATIONS GRADE AND PAY RETENTION Pay Retention § 536.304 Determining an employee's pay retention entitlement. (a) General. (1) When an employee becomes entitled to pay retention under § 536.301 or 536.302 or...

  5. 20 CFR 216.93 - Entitlement to more than one survivor annuity.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Entitlement to more than one survivor annuity. 216.93 Section 216.93 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD... than one survivor annuity. If an individual is entitled to more than one survivor annuity, only...

  6. 20 CFR 216.92 - Entitlement as a spouse or divorced spouse and as a survivor.

    Science.gov (United States)

    2010-04-01

    ... and as a survivor. 216.92 Section 216.92 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS....92 Entitlement as a spouse or divorced spouse and as a survivor. If an individual is entitled to both a spouse or divorced spouse and survivor annuity, only the larger annuity will be paid. However,...

  7. 20 CFR 228.21 - Entitlement as a spouse or divorced spouse and as a survivor.

    Science.gov (United States)

    2010-04-01

    ... and as a survivor. 228.21 Section 228.21 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT COMPUTATION OF SURVIVOR ANNUITIES The Tier I Annuity Component § 228.21 Entitlement as a spouse or divorced spouse and as a survivor. If an individual is entitled to...

  8. Does the Measurement or Magnitude of Academic Entitlement Change over Time?

    Science.gov (United States)

    Sessoms, John; Finney, Sara J.; Kopp, Jason P.

    2016-01-01

    Academic entitlement (AE) characterizes students who believe they deserve positive academic outcomes independent of performance. Using the Academic Entitlement Questionnaire, we evaluated the longitudinal stability of the measurement and magnitude of AE. Results indicated partial measurement invariance, slight average increase in AE, and…

  9. 7 CFR 272.11 - Systematic Alien Verification for Entitlements (SAVE) Program.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 4 2010-01-01 2010-01-01 false Systematic Alien Verification for Entitlements (SAVE... FOR PARTICIPATING STATE AGENCIES § 272.11 Systematic Alien Verification for Entitlements (SAVE... and Naturalization Service (INS), in order to verify the validity of documents provided by...

  10. Challenging the Assumption of a Western Phenomenon: Academic Entitlement in Saudi Arabia

    Science.gov (United States)

    Blincoe, Sarai; Garris, Christopher P.

    2017-01-01

    Academic entitlement (AE) is increasingly associated with problematic behaviors and attitudes, including student incivility and endorsement of cheating. As research on this context-specific form of entitlement increases, no one has yet explored the rates of occurrence outside of North America. To investigate whether students at North American…

  11. 20 CFR 725.213 - Duration of entitlement; surviving spouse or surviving divorced spouse.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Duration of entitlement; surviving spouse or surviving divorced spouse. 725.213 Section 725.213 Employees' Benefits EMPLOYMENT STANDARDS ADMINISTRATION... Benefits) § 725.213 Duration of entitlement; surviving spouse or surviving divorced spouse. (a)...

  12. 20 CFR 725.212 - Conditions of entitlement; surviving spouse or surviving divorced spouse.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Conditions of entitlement; surviving spouse or surviving divorced spouse. 725.212 Section 725.212 Employees' Benefits EMPLOYMENT STANDARDS... Dependents (augmented Benefits) § 725.212 Conditions of entitlement; surviving spouse or surviving...

  13. 20 CFR 410.706 - Effect of the Social Security Administration determination of entitlement.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Effect of the Social Security Administration determination of entitlement. 410.706 Section 410.706 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL... the Social Security Administration determination of entitlement. Under section 435 of the BLBRA...

  14. 47 CFR 76.93 - Parties entitled to network non-duplication protection.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Parties entitled to network non-duplication... RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Network Non-duplication Protection, Syndicated Exclusivity and Sports Blackout § 76.93 Parties entitled to network non-duplication...

  15. 22 CFR 40.203 - Alien entitled to A, E, or G nonimmigrant classification.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Alien entitled to A, E, or G nonimmigrant classification. 40.203 Section 40.203 Foreign Relations DEPARTMENT OF STATE VISAS REGULATIONS PERTAINING TO BOTH NONIMMIGRANTS AND IMMIGRANTS UNDER THE IMMIGRATION AND NATIONALITY ACT, AS AMENDED Failure to Comply with INA § 40.203 Alien entitled to A,...

  16. Software engineering

    CERN Document Server

    Thorin, Marc

    1985-01-01

    Software Engineering describes the conceptual bases as well as the main methods and rules on computer programming. This book presents software engineering as a coherent and logically built synthesis and makes it possible to properly carry out an application of small or medium difficulty that can later be developed and adapted to more complex cases. This text is comprised of six chapters and begins by introducing the reader to the fundamental notions of entities, actions, and programming. The next two chapters elaborate on the concepts of information and consistency domains and show that a proc

  17. [Software version and medical device software supervision].

    Science.gov (United States)

    Peng, Liang; Liu, Xiaoyan

    2015-01-01

    The importance of software version in the medical device software supervision does not cause enough attention at present. First of all, the effect of software version in the medical device software supervision is discussed, and then the necessity of software version in the medical device software supervision is analyzed based on the discussion of the misunderstanding of software version. Finally the concrete suggestions on software version naming rules, software version supervision for the software in medical devices, and software version supervision scheme are proposed.

  18. Educational Software.

    Science.gov (United States)

    Northwest Regional Educational Lab., Portland, OR.

    The third session of IT@EDU98 consisted of five papers on educational software and was chaired by Tran Van Hao (University of Education, Ho Chi Minh City, Vietnam). "Courseware Engineering" (Nguyen Thanh Son, Ngo Ngoc Bao Tran, Quan Thanh Tho, Nguyen Hong Lam) briefly describes the use of courseware. "Machine Discovery Theorems in Geometry: A…

  19. Software Patents.

    Science.gov (United States)

    Burke, Edmund B.

    1994-01-01

    Outlines basic patent law information that pertains to computer software programs. Topics addressed include protection in other countries; how to obtain patents; kinds of patents; duration; classes of patentable subject matter, including machines and processes; patentability searches; experimental use prior to obtaining a patent; and patent…

  20. Software Systems

    Institute of Scientific and Technical Information of China (English)

    崔涛; 周淼

    1996-01-01

    The information used with computers is known as software and includesprograms and data. Programs are sets of instructions telling the computerwhat operations have to be carried out and in what order they should be done. Specialised programs which enable the computer to be used for particularpurposes are called applications programs. A collection of these programs kept

  1. Software Reviews.

    Science.gov (United States)

    Science and Children, 1990

    1990-01-01

    Reviewed are seven computer software packages for IBM and/or Apple Computers. Included are "Windows on Science: Volume 1--Physical Science"; "Science Probe--Physical Science"; "Wildlife Adventures--Grizzly Bears"; "Science Skills--Development Programs"; "The Clean Machine"; "Rock Doctor"; and "Geology Search." Cost, quality, hardware, and…

  2. SRC area design considerations. Non-proprietary version. [Reexamination of 15 critical equipment or process items

    Energy Technology Data Exchange (ETDEWEB)

    1984-06-01

    ICRC requested Catalytic to research, review and analyze their record documents, presently stored at a warehousing facility, (Records Management Associates, 2410 Walnut Street, Philadelphia, PA 19107), and prepare a report outlining the technical concerns, actions taken to offset these concerns, results of these actions, and recommend further investigation, if deemed necessary. This report reviews the fifteen systems or items requested in Work Order XQ-3353. These had been previously listed on ICRC's Critical Technology List, and were subjected to special technical reviews and studies in order to ensure the highest possible level of quality and lowest cost commensurate with the overall risks. The fifteen systems or items are listed, previous work on each is examined and new evaluations and conclusions are drawn.

  3. EPIQR software

    Energy Technology Data Exchange (ETDEWEB)

    Flourentzos, F. [Federal Institute of Technology, Lausanne (Switzerland); Droutsa, K. [National Observatory of Athens, Athens (Greece); Wittchen, K.B. [Danish Building Research Institute, Hoersholm (Denmark)

    1999-11-01

    The support of the EPIQR method is a multimedia computer program. Several modules help the users of the method to treat the data collected during a diagnosis survey, to set up refurbishment scenario and calculate their cost or energy performance, and finally to visualize the results in a comprehensive way and to prepare quality reports. This article presents the structure and the main features of the software. (au)

  4. EPIQR software

    Energy Technology Data Exchange (ETDEWEB)

    Flourentzos, F. [Federal Institute of Technology-Lausanne (EPFL), Solar Energy and Building Physics Laboratory (LESO-PB), Lausanne (Switzerland); Droutsa, K. [National Observatory of Athens, Institute of Meteorology and Physics of Atmospheric Environment, Group Energy Conservation, Athens (Greece); Wittchen, K.B. [Danish Building Research Institute, Division of Energy and Indoor Environment, Hoersholm, (Denmark)

    2000-07-01

    The support of the EPIQR method is a multimedia computer program. Several modules help the users of the method to treat the data collected during a diagnosis survey, to set up refurbishment scenarios and calculate their cost or energy performance, and finally to visualize the results in a comprehensive way and to prepare quality reports. This article presents the structure and the main features of the software. (author)

  5. Software preservation

    Directory of Open Access Journals (Sweden)

    Tadej Vodopivec

    2011-01-01

    Full Text Available Comtrade Ltd. covers a wide range of activities related to information and communication technologies; its deliverables include web applications, locally installed programs,system software, drivers, embedded software (used e.g. in medical devices, auto parts,communication switchboards. Also the extensive knowledge and practical experience about digital long-term preservation technologies have been acquired. This wide spectrum of activities puts us in the position to discuss the often overlooked aspect of the digital preservation - preservation of software programs. There are many resources dedicated to digital preservation of digital data, documents and multimedia records,but not so many about how to preserve the functionalities and features of computer programs. Exactly these functionalities - dynamic response to inputs - render the computer programs rich compared to documents or linear multimedia. The article opens the questions on the beginning of the way to the permanent digital preservation. The purpose is to find a way in the right direction, where all relevant aspects will be covered in proper balance. The following questions are asked: why at all to preserve computer programs permanently, who should do this and for whom, when we should think about permanent program preservation, what should be persevered (such as source code, screenshots, documentation, and social context of the program - e.g. media response to it ..., where and how? To illustrate the theoretic concepts given the idea of virtual national museum of electronic banking is also presented.

  6. Software Engineering to Professionalize Software Development

    Directory of Open Access Journals (Sweden)

    Juan Miguel Alonso

    2011-12-01

    Full Text Available The role, increasingly important, that plays the software in the systems with widespread effects presents new challenges for the formation of Software Engineers. Not only because social dependence software is increasing, but also because the character of software development is also changing and with it the demands for software developers certified. In this paper are propose some challenges and aspirations that guide the learning processes Software Engineering and help to identify the need to train professionals in software development.

  7. Securing the best performance entitlement from MFL (Magnetic Flus Leakage)

    Energy Technology Data Exchange (ETDEWEB)

    Mullin, Ian P. [GE Oil and Gas, PII Pipeline Solutions, Stutensee (Germany)

    2009-07-01

    Magnetic Flux Leakage (MFL) tools are used to inspect around 70-80% of pipelines in the world, and the art of designing these tools has been established over the past 40 years. This paper investigates the science behind the art, and describes the fundamentals of MFL magnetiser design, focusing on the effects that various design options have on magnetic performance. Comparisons are drawn between a magnetiser bar design (hereafter referenced as 'magbar') and solid core bristle design (hereafter referenced as 'sweep's brush') including variations upon each. The study was carried out through the combined use of Vector Fields 3D and 2D finite element modelling and analysis software. (author)

  8. Space Software

    Science.gov (United States)

    1990-01-01

    Xontech, Inc.'s software package, XonVu, simulates the missions of Voyager 1 at Jupiter and Saturn, Voyager 2 at Jupiter, Saturn, Uranus and Neptune, and Giotto in close encounter with Comet Halley. With the program, the user can generate scenes of the planets, moons, stars or Halley's nucleus and tail as seen by Giotto, all graphically reproduced with high accuracy in wireframe representation. Program can be used on a wide range of computers, including PCs. User friendly and interactive, with many options, XonVu can be used by a space novice or a professional astronomer. With a companion user's manual, it sells for $79.

  9. Software architecture

    CERN Document Server

    Vogel, Oliver; Chughtai, Arif

    2011-01-01

    As a software architect you work in a wide-ranging and dynamic environment. You have to understand the needs of your customer, design architectures that satisfy both functional and non-functional requirements, and lead development teams in implementing the architecture. And it is an environment that is constantly changing: trends such as cloud computing, service orientation, and model-driven procedures open up new architectural possibilities. This book will help you to develop a holistic architectural awareness and knowledge base that extends beyond concrete methods, techniques, and technologi

  10. 20 CFR 404.339 - How do I become entitled to mother's or father's benefits as a surviving spouse?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How do I become entitled to mother's or father's benefits as a surviving spouse? 404.339 Section 404.339 Employees' Benefits SOCIAL SECURITY... do I become entitled to mother's or father's benefits as a surviving spouse? You may be entitled...

  11. 76 FR 28789 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    Science.gov (United States)

    2011-05-18

    ... Occupational Respiratory Disease from Dampness in Office Buildings, Schools, and other Nonindustrial Buildings... HUMAN SERVICES Centers for Disease Control and Prevention Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness in Office Buildings, Schools, and Other Nonindustrial Buildings''...

  12. 75 FR 3163 - Vocational Rehabilitation and Employment Program-Basic Entitlement; Effective Date of Induction...

    Science.gov (United States)

    2010-01-20

    ...; Effective Date of Induction Into a Rehabilitation Program; Cooperation in Initial Evaluation AGENCY... provisions concerning: Individuals' basic entitlement to vocational rehabilitation benefits and services...' cooperation and lack of cooperation in the initial evaluation process. The amendments are intended to...

  13. Self-entitled college students: Contributions of personality, parenting, and motivational factors

    OpenAIRE

    Greenberger, E; Lessard, J.; Chen, C.; Farruggia, SP

    2008-01-01

    Anecdotal evidence suggests an increase in entitled attitudes and behaviors of youth in school and college settings. Using a newly developed scale to assess "academic entitlement" (AE), a construct that includes expectations of high grades for modest effort and demanding attitudes towards teachers, this research is the first to investigate the phenomenon systematically. In two separate samples of ethnically diverse college students comprised largely of East and Southeast Asian American, follo...

  14. Global Software Engineering: A Software Process Approach

    Science.gov (United States)

    Richardson, Ita; Casey, Valentine; Burton, John; McCaffery, Fergal

    Our research has shown that many companies are struggling with the successful implementation of global software engineering, due to temporal, cultural and geographical distance, which causes a range of factors to come into play. For example, cultural, project managementproject management and communication difficulties continually cause problems for software engineers and project managers. While the implementation of efficient software processes can be used to improve the quality of the software product, published software process models do not cater explicitly for the recent growth in global software engineering. Our thesis is that global software engineering factors should be included in software process models to ensure their continued usefulness in global organisations. Based on extensive global software engineering research, we have developed a software process, Global Teaming, which includes specific practices and sub-practices. The purpose is to ensure that requirements for successful global software engineering are stipulated so that organisations can ensure successful implementation of global software engineering.

  15. Proceedings of the Twenty-Fourth Annual Software Engineering Workshop

    Science.gov (United States)

    2000-01-01

    On December 1 and 2, the Software Engineering Laboratory (SEL), a consortium composed of NASA/Goddard, the University of Maryland, and CSC, held the 24th Software Engineering Workshop (SEW), the last of the millennium. Approximately 240 people attended the 2-day workshop. Day 1 was composed of four sessions: International Influence of the Software Engineering Laboratory; Object Oriented Testing and Reading; Software Process Improvement; and Space Software. For the first session, three internationally known software process experts discussed the influence of the SEL with respect to software engineering research. In the Space Software session, prominent representatives from three different NASA sites- GSFC's Marti Szczur, the Jet Propulsion Laboratory's Rick Doyle, and the Ames Research Center IV&V Facility's Lou Blazy- discussed the future of space software in their respective centers. At the end of the first day, the SEW sponsored a reception at the GSFC Visitors' Center. Day 2 also provided four sessions: Using the Experience Factory; A panel discussion entitled "Software Past, Present, and Future: Views from Government, Industry, and Academia"; Inspections; and COTS. The day started with an excellent talk by CSC's Frank McGarry on "Attaining Level 5 in CMM Process Maturity." Session 2, the panel discussion on software, featured NASA Chief Information Officer Lee Holcomb (Government), our own Jerry Page (Industry), and Mike Evangelist of the National Science Foundation (Academia). Each presented his perspective on the most important developments in software in the past 10 years, in the present, and in the future.

  16. Empirically Validating an Analytical Method for Assessing the Impact of Design Patterns on Software Quality : Three Case Studies

    NARCIS (Netherlands)

    Ampatzoglou, Apostolos; Avgeriou, Paris; Arvanitou, Elvira Maria; Stamelos, Ioannis

    2013-01-01

    This technical report has been created as support material for the paper entitled “Empirically Validating an Analytical Method for Assessing the Impact of Design Patterns on Software Quality: A Case Study” that has been submitted in ACM Transactions on Software Engineering. The corresponding paper a

  17. SOFTWARE METRICS VALIDATION METHODOLOGIES IN SOFTWARE ENGINEERING

    Directory of Open Access Journals (Sweden)

    K.P. Srinivasan

    2014-12-01

    Full Text Available In the software measurement validations, assessing the validation of software metrics in software engineering is a very difficult task due to lack of theoretical methodology and empirical methodology [41, 44, 45]. During recent years, there have been a number of researchers addressing the issue of validating software metrics. At present, software metrics are validated theoretically using properties of measures. Further, software measurement plays an important role in understanding and controlling software development practices and products. The major requirement in software measurement is that the measures must represent accurately those attributes they purport to quantify and validation is critical to the success of software measurement. Normally, validation is a collection of analysis and testing activities across the full life cycle and complements the efforts of other quality engineering functions and validation is a critical task in any engineering project. Further, validation objective is to discover defects in a system and assess whether or not the system is useful and usable in operational situation. In the case of software engineering, validation is one of the software engineering disciplines that help build quality into software. The major objective of software validation process is to determine that the software performs its intended functions correctly and provides information about its quality and reliability. This paper discusses the validation methodology, techniques and different properties of measures that are used for software metrics validation. In most cases, theoretical and empirical validations are conducted for software metrics validations in software engineering [1-50].

  18. Biology Teacher and Expert Opinions about Computer Assisted Biology Instruction Materials: A Software Entitled Nucleic Acids and Protein Synthesis

    Science.gov (United States)

    Hasenekoglu, Ismet; Timucin, Melih

    2007-01-01

    The aim of this study is to collect and evaluate opinions of CAI experts and biology teachers about a high school level Computer Assisted Biology Instruction Material presenting computer-made modelling and simulations. It is a case study. A material covering "Nucleic Acids and Protein Synthesis" topic was developed as the…

  19. Sandia software guidelines: Software quality planning

    Energy Technology Data Exchange (ETDEWEB)

    1987-08-01

    This volume is one in a series of Sandia Software Guidelines intended for use in producing quality software within Sandia National Laboratories. In consonance with the IEEE Standard for Software Quality Assurance Plans, this volume identifies procedures to follow in producing a Software Quality Assurance Plan for an organization or a project, and provides an example project SQA plan. 2 figs., 4 tabs.

  20. Software engineering architecture-driven software development

    CERN Document Server

    Schmidt, Richard F

    2013-01-01

    Software Engineering: Architecture-driven Software Development is the first comprehensive guide to the underlying skills embodied in the IEEE's Software Engineering Body of Knowledge (SWEBOK) standard. Standards expert Richard Schmidt explains the traditional software engineering practices recognized for developing projects for government or corporate systems. Software engineering education often lacks standardization, with many institutions focusing on implementation rather than design as it impacts product architecture. Many graduates join the workforce with incomplete skil

  1. Software Metrics to Estimate Software Quality using Software Component Reusability

    Directory of Open Access Journals (Sweden)

    Prakriti Trivedi

    2012-03-01

    Full Text Available Today most of the applications developed using some existing libraries, codes, open sources etc. As a code is accessed in a program, it is represented as the software component. Such as in java beans and in .net ActiveX controls are the software components. These components are ready to use programming code or controls that excel the code development. A component based software system defines the concept of software reusability. While using these components the main question arise is whether to use such components is beneficial or not. In this proposed work we are trying to present the answer for the same question. In this work we are presenting a set of software matrix that will check the interconnection between the software component and the application. How strong this relation defines the software quality after using this software component. The overall metrics will return the final result in terms of the boundless of the component with application.

  2. Environmental Entitlements: Institutional Influence on Mangrove Social-Ecological Systems in Northern Vietnam

    Directory of Open Access Journals (Sweden)

    Steven E. Orchard

    2015-11-01

    Full Text Available Environment and development issues are complex and interdependent. Institutions underpinning state, private sector and civil society actions at various levels must address complexity to ensure social-ecological system integrity. However, responses often operate at only one governance level, with limited interactions with other levels, restricting their ability to support communities who depend on natural resources for their livelihoods. This paper explores institutional factors influencing household entitlements to mangrove system provisioning goods on Vietnam’s northern coast. The environmental entitlements framework is used to identify: (1 current formal and informal institutional structures relating to mangrove systems; (2 the influence of state, private sector and non-governmental organisation actors at various levels; and (3 how actions occurring at and among various levels of governance shape mangrove system entitlements at the local level. Employing a case study approach, this research utilises qualitative methods and a multi-level governance approach to understand prevailing institutional contexts. Results indicate that reforms occurring within weak regulatory frameworks led to the concentration of power at the meso level, reducing the endowments of marginalized households. Market forces facilitated inequality and environmental degradation, negatively impacting household entitlements. Finally, a lack of formally recognised civil society constrained household capabilities to participate in mangrove planning. Mangrove dependent households must be integrated into mangrove planning at the local level, as processes at higher institutional levels affect household environmental entitlements and threaten sustainable outcomes. Ensuring views from the local level feed into the multi-level governance process is vital.

  3. The software life cycle

    CERN Document Server

    Ince, Darrel

    1990-01-01

    The Software Life Cycle deals with the software lifecycle, that is, what exactly happens when software is developed. Topics covered include aspects of software engineering, structured techniques of software development, and software project management. The use of mathematics to design and develop computer systems is also discussed. This book is comprised of 20 chapters divided into four sections and begins with an overview of software engineering and software development, paying particular attention to the birth of software engineering and the introduction of formal methods of software develop

  4. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    CERN Multimedia

    DG Unit

    2009-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website: for the Canton of Genevafor the Canton of VaudThe dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities: for Geneva: referendum and forthcoming ballots ; for Vaud: forthcoming ballots In this context, please note, especially with regard to eligibility for election, that: in accordance with Articles S I 3.05 and I 3.06 of the Staff Rules "Members of the personnel wishing to take part in the public and political life of a State shall comply with the relevant legislat...

  5. Entitlement to vote in the Canton of Geneva and entitlement to vote and eligibility for election in the Canton of Vaud

    CERN Multimedia

    DG Unit

    2011-01-01

    You are reminded that, at commune level, certain international civil servants and their family members: are entitled to vote in the Canton of Geneva are entitled to vote and are eligible for election in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise these entitlements, you are invited to consult the information published, in French only, on the Swiss Mission’s website (topic « Privileges and immunities (Manual) » : http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud). The dates of the forthcoming ballots are available on the official websites of the cantonal administrative authorities : for Geneva: http://www.ge.ch/votations-elections/prochains-scrutins/; for Vaud: http://www.vd.ch/fr/themes/etat-droit-financ...

  6. Psychological entitlement: interpersonal consequences and validation of a self-report measure.

    Science.gov (United States)

    Campbell, W Keith; Bonacci, Angelica M; Shelton, Jeremy; Exline, Julie J; Bushman, Brad J

    2004-08-01

    Nine studies were conducted with the goal of developing a self-report measure of psychological entitlement and assessing its interpersonal consequences. The Psychological Entitlement Scale (PES) was found to be reliable and valid (Study 1, 2), not associated with social desirability (Study 2), stable across time (Study 3), and correlated negatively with two of the Big Five factors: agreeableness and emotional stability (Study 4). The validity of the PES was confirmed in studies that assessed willingness to take candy designated for children (Study 5) and reported deservingness of pay in a hypothetical employment setting (Study 6). Finally, the PES was linked to important interpersonal consequences including competitive choices in a commons dilemma (Study 7), selfish approaches to romantic relationships (Study 8), and aggression following ego threat (Study 9). Psychological entitlement has a pervasive and largely unconstructive impact on social behavior.

  7. Approaching Corporate Social Responsibility through Kenneth Burke's Notions of Terministic Screens and Entitlement

    DEFF Research Database (Denmark)

    Kampf, Constance

    summarizes Burke's essay, "Antinomies of Definition," from a Grammar of Motives as demonstrating that 'the intrinsic and the extrinsic can change places' "such that to define is always to contextualize and to uncover the absence of a solid ground for a claim to knowledge."2   So if the intrinsic...... allow for user agency, whereas entitlement appears to be focused more at the cultural level, with the agency shared by the 'tribe,' the language itself, and the context of situation.1 In other words, "terministic screens" appear to be extrinsic, while "entitlement" appears to be intrinsic.  Carmichael...... and extrinsic can change places, the interpretive process of "terministic screens" and the constitutive process of "entitlement" may well be reciprocal.  The implications of this reciprocity can be used as a basis for understanding the linguistic and cultural components of Corporate Social Responsibility...

  8. Amalgamation of Personal Software Process in Software ...

    African Journals Online (AJOL)

    evolutionary series of personal software engineering techniques that an engineer learns and ... Article History: Received : 30-04- ... began to realize that software process, plans and methodologies for ..... Executive Strategy. Addison-Wesley ...

  9. Software attribute visualization for high integrity software

    Energy Technology Data Exchange (ETDEWEB)

    Pollock, G.M.

    1998-03-01

    This report documents a prototype tool developed to investigate the use of visualization and virtual reality technologies for improving software surety confidence. The tool is utilized within the execution phase of the software life cycle. It provides a capability to monitor an executing program against prespecified requirements constraints provided in a program written in the requirements specification language SAGE. The resulting Software Attribute Visual Analysis Tool (SAVAnT) also provides a technique to assess the completeness of a software specification.

  10. Ontologies for software engineering and software technology

    CERN Document Server

    Calero, Coral; Piattini, Mario

    2006-01-01

    Covers two applications of ontologies in software engineering and software technology: sharing knowledge of the problem domain and using a common terminology among all stakeholders; and filtering the knowledge when defining models and metamodels. This book is of benefit to software engineering researchers in both academia and industry.

  11. Controlling Software Piracy.

    Science.gov (United States)

    King, Albert S.

    1992-01-01

    Explains what software manufacturers are doing to combat software piracy, recommends how managers should deal with this problem, and provides a role-playing exercise to help students understand the issues in software piracy. (SR)

  12. Space Flight Software Development Software for Intelligent System Health Management

    Science.gov (United States)

    Trevino, Luis C.; Crumbley, Tim

    2004-01-01

    The slide presentation examines the Marshall Space Flight Center Flight Software Branch, including software development projects, mission critical space flight software development, software technical insight, advanced software development technologies, and continuous improvement in the software development processes and methods.

  13. [Social Law Entitlements and Compensations for Visually Impaired Patients in Germany, Focussed on Glaucoma].

    Science.gov (United States)

    Stamm, C C

    2016-02-01

    Although prevention of progression is the most important issue in the treatment of glaucoma patients, information on visual aids and social law entitlements is also helpful. In this article, the main aspects of compensation for visual impairment are outlined so that you can competently support your patients, without much effort, with helpful tips and appropriate instructions.

  14. Entitlement Can Both Decrease and Increase Consumer Susceptibility to Social Influence

    NARCIS (Netherlands)

    van der Heide, Martine; Fennis, Bob; van Ittersum, Koert; Trampe, Debra; Diehl, Kristin; Yoon, Carolyn

    2015-01-01

    Two studies indicate that entitlement—a sense that one deserves special treatment and is exempt from normal social demands—can both buffer and boost consumers’ proneness to social influence. Specifically, Study 1 shows that entitlement reduces susceptibility to consistency appeals. Study 2, however,

  15. 12 CFR 987.4 - Creation of Participant's Security Entitlement; security interests.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Creation of Participant's Security Entitlement... BOOK-ENTRY PROCEDURE FOR CONSOLIDATED OBLIGATIONS § 987.4 Creation of Participant's Security... of the United States to secure deposits of public money, including, without limitation, deposits to...

  16. Human Rights as Practice: Dalit Women's Collective Action to Secure Livelihood Entitlements in rural South India

    NARCIS (Netherlands)

    Mangubhai, Y.|info:eu-repo/dai/nl/412461277

    2012-01-01

    In this dissertation, I investigate how Dalit women in rural South India secure livelihood entitlements by analysing processes of social exclusion as well as collective action by these women through their perspectives. This problematic requires focus on how caste, class and gender mutually construct

  17. Measuring policy entitlements at the micro-level: maternity and parental leave in Europe

    NARCIS (Netherlands)

    Bártová, A.; Emery, T.

    2016-01-01

    Comparative social policy analysis has been shaped by the measurement of policy as a macro phenomenon. However, social policy theories have consistently asserted that policy entitlements vary across class, gender, ethnicity and the life-course. This paper synthesises a number of innovations to

  18. "It takes two to take": Caregiving style, relational entitlement, and medication adherence.

    Science.gov (United States)

    George-Levi, Sivan; Vilchinsky, Noa; Tolmacz, Rami; Khaskiaa, Abid; Mosseri, Morris; Hod, Hanoch

    2016-09-01

    Partners' support has been associated with both patients' increased and decreased inclination toward health-promoting behaviors. Our hypothesis for understanding this enigma is that it is the interplay between partners' manner of care provision and patients' ability to accept these care efforts that may best predict patients' adherence. Thus, the current study's main goal was to examine the contribution of the interaction between caregivers' support style (sensitive and compulsive) and cardiac patients' sense of relational entitlement (restricted, excessive, assertive, entitlement expectations) to patients' medication adherence. The Adult Caregiving Questionnaire, the Sense of Relational Entitlement Scale, and the Medication Adherence Report Scale were administered to 114 cardiac patients and their partners, during patients' hospitalizations and 6 months later. The lowest levels of medication adherence were detected among patients high on restricted entitlement who were married to partners high on compulsive caregiving style. These findings strengthen our claim that it is the interaction between recipients' personality and providers' support style which explain self-regulatory processes that arise during times of family medical crises. (PsycINFO Database Record

  19. A Non-Member Spouse's Entitlement To The Member's Pension Interest

    Directory of Open Access Journals (Sweden)

    Motseotsile Clement Marumoagae

    2014-12-01

    Full Text Available It is important that married couples seek legal advice with regard to the assets falling within their joint estate, more particularly their retirement benefits. This article reflects on the entitlement (if any of non-member spouses to their spouses' retirement fund benefits. Pension benefits can be due before, during or after divorce, and parties to the marriage should be aware of their rights with regard to the accruing pension benefits of their spouses. While it is settled law that non-member spouses are entitled to receive a portion of their member spouses' pension benefits (known as "pension interest" immediately on divorce, it is not particularly clear whether non-member spouses are also entitled to receive the same before or sometime after divorce. In this article I provide a contextual understanding of the entitlements (if any which spouses or former spouses of members of pension funds have on such member spouses' retirement benefits. Furthermore, it shown in this article that various divisions of South African High Courts have been inconsistent in how they have approached the issue of the pension interest between divorcing spouses or divorced ex-spouses.

  20. 42 CFR 406.7 - Forms to apply for entitlement under Medicare Part A.

    Science.gov (United States)

    2010-10-01

    ... charge by mail from CMS or at any Social Security branch or district office, are used to apply for Medicare entitlement under the circumstances indicated: CMS-18-F-5—Application for Hospital Insurance... Security Act or under the Railroad Retirement Act. This form may also be used for enrollment in...

  1. 20 CFR 410.210 - Conditions of entitlement; widow or surviving divorced wife.

    Science.gov (United States)

    2010-04-01

    ... divorced wife. 410.210 Section 410.210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE... surviving divorced wife. An individual is entitled to benefits if such individual: (a) Is the widow (see § 410.320) or surviving divorced wife (see § 410.321) of a miner (see § 410.110(j)); (b) Is not...

  2. 20 CFR 410.211 - Duration of entitlement; widow or surviving divorced wife.

    Science.gov (United States)

    2010-04-01

    ... divorced wife. 410.211 Section 410.211 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE... surviving divorced wife. (a) An individual is entitled to benefits as a widow, or as a surviving divorced wife, for each month beginning with the first month in which all of the conditions of...

  3. 76 FR 30366 - Draft Alert Entitled “Preventing Occupational Respiratory Disease From Dampness in Office...

    Science.gov (United States)

    2011-05-25

    ... No: 2011-12935] DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Disease Control and Prevention [Docket Number NIOSH-238] Draft Alert Entitled ``Preventing Occupational Respiratory Disease From Dampness..., Director, National Institute for Occupational Safety and Health, Centers for Disease Control and...

  4. 38 CFR 3.274 - Relationship of net worth to pension entitlement.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Relationship of net worth to pension entitlement. 3.274 Section 3.274 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF VETERANS AFFAIRS ADJUDICATION Pension, Compensation, and Dependency and Indemnity Compensation Regulations...

  5. 20 CFR 670.910 - Are students entitled to Federal Employees Compensation Benefits (FECB)?

    Science.gov (United States)

    2010-04-01

    ... Compensation Benefits (FECB)? 670.910 Section 670.910 Employees' Benefits EMPLOYMENT AND TRAINING... and Management Provisions § 670.910 Are students entitled to Federal Employees Compensation Benefits... Compensation Benefits as specified in WIA section 157. (c) Job Corps students must meet the same eligibility...

  6. Student Entitlement Models in Australia's National Training System: Expert Views. Occasional Paper

    Science.gov (United States)

    Bowman, Kaye; McKenna, Suzy

    2016-01-01

    This occasional paper provides the views of 17 "thought leaders" in the Australian vocational education and training (VET) sector. Their insight and opinions were sought to inform a larger research project focused on the student entitlement reforms that were introduced into the national VET system from 2012. These individuals offered a…

  7. About the Article Entitled "Transplantation of Cryopreserved Teeth:a Systematic Review"

    Institute of Scientific and Technical Information of China (English)

    Proamate Pitak-Arnnop; Niels Christian Pausch; Alexander Hemprich

    2010-01-01

    @@ To Editor, We read with interest the article entitled "Transplantation of cryopreserved teeth:a systematic review"(Osathanon,2010).Although the author is to be congratulated for his systematic approach to cryopreserved tooth transplantation(CTT),we would like to draw your attention to some technical limitations of this review.

  8. 20 CFR 404.310 - When am I entitled to old-age benefits?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When am I entitled to old-age benefits? 404.310 Section 404.310 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Old-Age, Disability, Dependents' and Survivors' Insurance Benefits; Period...

  9. 42 CFR 460.112 - Specific rights to which a participant is entitled.

    Science.gov (United States)

    2010-10-01

    ..., ethnicity, national origin, religion, sex, age, sexual orientation, mental or physical disability, or source... 42 Public Health 4 2010-10-01 2010-10-01 false Specific rights to which a participant is entitled...-INCLUSIVE CARE FOR THE ELDERLY (PACE) Participant Rights § 460.112 Specific rights to which a participant...

  10. Software Engineering Guidebook

    Science.gov (United States)

    Connell, John; Wenneson, Greg

    1993-01-01

    The Software Engineering Guidebook describes SEPG (Software Engineering Process Group) supported processes and techniques for engineering quality software in NASA environments. Three process models are supported: structured, object-oriented, and evolutionary rapid-prototyping. The guidebook covers software life-cycles, engineering, assurance, and configuration management. The guidebook is written for managers and engineers who manage, develop, enhance, and/or maintain software under the Computer Software Services Contract.

  11. Software and systems traceability

    CERN Document Server

    Cleland-Huang, Jane; Zisman, Andrea

    2012-01-01

    ""Software and Systems Traceability"" provides a comprehensive description of the practices and theories of software traceability across all phases of the software development lifecycle. The term software traceability is derived from the concept of requirements traceability. Requirements traceability is the ability to track a requirement all the way from its origins to the downstream work products that implement that requirement in a software system. Software traceability is defined as the ability to relate the various types of software artefacts created during the development of software syst

  12. Maximizing ROI on software development

    CERN Document Server

    Sikka, Vijay

    2004-01-01

    A brief review of software development history. Software complexity crisis. Software development ROI. The case for global software development and testing. Software quality and test ROI. How do you implement global software development and testing. Case studies.

  13. Is the Narcissistic Personality Inventory Still Relevant? A Test of Independent Grandiosity and Entitlement Scales in the Assessment of Narcissism

    Science.gov (United States)

    Miller, Joshua D.; Price, Joanna; Campbell, W. Keith

    2012-01-01

    Some scholars have called for the replacement of the Narcissistic Personality Inventory (NPI) with more narrow scales measuring grandiosity and entitlement instead. In the current study, the authors examined the relations among the NPI and measures of grandiosity and entitlement, as well as in relation to a measure of the Five-Factor Model (FFM).…

  14. Is the Narcissistic Personality Inventory Still Relevant? A Test of Independent Grandiosity and Entitlement Scales in the Assessment of Narcissism

    Science.gov (United States)

    Miller, Joshua D.; Price, Joanna; Campbell, W. Keith

    2012-01-01

    Some scholars have called for the replacement of the Narcissistic Personality Inventory (NPI) with more narrow scales measuring grandiosity and entitlement instead. In the current study, the authors examined the relations among the NPI and measures of grandiosity and entitlement, as well as in relation to a measure of the Five-Factor Model (FFM).…

  15. 20 CFR 404.288 - Recomputing when you are entitled to a monthly pension based on noncovered employment.

    Science.gov (United States)

    2010-04-01

    ... monthly pension based on noncovered employment. 404.288 Section 404.288 Employees' Benefits SOCIAL... monthly pension based on noncovered employment. (a) After entitlement to old-age or disability insurance... later become entitled to a monthly pension based on noncovered employment, we may recompute your primary...

  16. 20 CFR 404.340 - How do I become entitled to mother's or father's benefits as a surviving divorced spouse?

    Science.gov (United States)

    2010-04-01

    ... father's benefits as a surviving divorced spouse? 404.340 Section 404.340 Employees' Benefits SOCIAL... § 404.340 How do I become entitled to mother's or father's benefits as a surviving divorced spouse? You may be entitled to mother's or father's benefits as the surviving divorced wife or the...

  17. 20 CFR 404.336 - How do I become entitled to widow's or widower's benefits as a surviving divorced spouse?

    Science.gov (United States)

    2010-04-01

    ... widower's benefits as a surviving divorced spouse? 404.336 Section 404.336 Employees' Benefits SOCIAL... § 404.336 How do I become entitled to widow's or widower's benefits as a surviving divorced spouse? We will find you entitled to widow's or widower's benefits as the surviving divorced wife or the...

  18. Improving Software Developer's Competence

    DEFF Research Database (Denmark)

    Abrahamsson, Pekka; Kautz, Karlheinz; Sieppi, Heikki

    2002-01-01

    Emerging agile software development methods are people oriented development approaches to be used by the software industry. The personal software process (PSP) is an accepted method for improving the capabilities of a single software engineer. Five original hypotheses regarding the impact...

  19. Ensuring Software IP Cleanliness

    Directory of Open Access Journals (Sweden)

    Mahshad Koohgoli

    2007-12-01

    Full Text Available At many points in the life of a software enterprise, determination of intellectual property (IP cleanliness becomes critical. The value of an enterprise that develops and sells software may depend on how clean the software is from the IP perspective. This article examines various methods of ensuring software IP cleanliness and discusses some of the benefits and shortcomings of current solutions.

  20. Improving Software Developer's Competence

    DEFF Research Database (Denmark)

    Abrahamsson, Pekka; Kautz, Karlheinz; Sieppi, Heikki

    2002-01-01

    Emerging agile software development methods are people oriented development approaches to be used by the software industry. The personal software process (PSP) is an accepted method for improving the capabilities of a single software engineer. Five original hypotheses regarding the impact...

  1. Agile Software Development

    Science.gov (United States)

    Biju, Soly Mathew

    2008-01-01

    Many software development firms are now adopting the agile software development method. This method involves the customer at every level of software development, thus reducing the impact of change in the requirement at a later stage. In this article, the principles of the agile method for software development are explored and there is a focus on…

  2. Software distribution using xnetlib

    Energy Technology Data Exchange (ETDEWEB)

    Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (US). Dept. of Computer Science]|[Oak Ridge National Lab., TN (US); Rowan, T.H. [Oak Ridge National Lab., TN (US); Wade, R.C. [Univ. of Tennessee, Knoxville, TN (US). Dept. of Computer Science

    1993-06-01

    Xnetlib is a new tool for software distribution. Whereas its predecessor netlib uses e-mail as the user interface to its large collection of public-domain mathematical software, xnetlib uses an X Window interface and socket-based communication. Xnetlib makes it easy to search through a large distributed collection of software and to retrieve requested software in seconds.

  3. Image Processing Software

    Science.gov (United States)

    Bosio, M. A.

    1990-11-01

    ABSTRACT: A brief description of astronomical image software is presented. This software was developed in a Digital Micro Vax II Computer System. : St presenta una somera descripci6n del software para procesamiento de imagenes. Este software fue desarrollado en un equipo Digital Micro Vax II. : DATA ANALYSIS - IMAGE PROCESSING

  4. Agile Software Development

    Science.gov (United States)

    Biju, Soly Mathew

    2008-01-01

    Many software development firms are now adopting the agile software development method. This method involves the customer at every level of software development, thus reducing the impact of change in the requirement at a later stage. In this article, the principles of the agile method for software development are explored and there is a focus on…

  5. Software productivity improvement through software engineering technology

    Science.gov (United States)

    Mcgarry, F. E.

    1985-01-01

    It has been estimated that NASA expends anywhere from 6 to 10 percent of its annual budget on the acquisition, implementation and maintenance of computer software. Although researchers have produced numerous software engineering approaches over the past 5-10 years; each claiming to be more effective than the other, there is very limited quantitative information verifying the measurable impact htat any of these technologies may have in a production environment. At NASA/GSFC, an extended research effort aimed at identifying and measuring software techniques that favorably impact productivity of software development, has been active over the past 8 years. Specific, measurable, software development technologies have been applied and measured in a production environment. Resulting software development approaches have been shown to be effective in both improving quality as well as productivity in this one environment.

  6. Great software debates

    CERN Document Server

    Davis, A

    2004-01-01

    The industry’s most outspoken and insightful critic explains how the software industry REALLY works. In Great Software Debates, Al Davis, shares what he has learned about the difference between the theory and the realities of business and encourages you to question and think about software engineering in ways that will help you succeed where others fail. In short, provocative essays, Davis fearlessly reveals the truth about process improvement, productivity, software quality, metrics, agile development, requirements documentation, modeling, software marketing and sales, empiricism, start-up financing, software research, requirements triage, software estimation, and entrepreneurship.

  7. Software Engineering for Practiced Software Enhancement

    Directory of Open Access Journals (Sweden)

    Rashmi Yadav

    2011-03-01

    Full Text Available Software development scenario particularly in IT industries is very competitive and demands for development with minimum resources. Software development started and prevailed up to an extent in industry without the use of software engineering practices, which was perceived as an overhead. This approach causes over use of resources, such as money, man-hours, hardware components. This paper attempts to present the causes of inefficiencies in an almost exhaustive way. Further, an attempt has been made to elaborate the software engineering methods as remedies against the listed causes of inefficiencies of development.

  8. Software Metrics for Identifying Software Size in Software Development Projects

    Directory of Open Access Journals (Sweden)

    V.S.P Vidanapathirana

    2015-11-01

    Full Text Available Measurements are fundamental any engineering discipline. They indicate the amount, extent, dimension or capacity of an attribute or a product, in a quantitative manner. The analyzed results of the measured data can be given as the basic idea of metrics. It is a quantitative representation of the measurements of the degree to which a system, component, or process possesses a given attribute. When it comes to software, the metrics are a wide scope of measurements of computer programming. The size oriented metrics takes a main role in it since they can be used as the key for better estimations, to improve trust and confidence, and to have a better control over the software products. Software professionals traditionally have been measuring the size of software applications by using several methods. In this paper the researchers discuss about the software size metrics for identifying software size and it is mainly focused on the software development projects in today’s Information Technology (IT industry.

  9. Software Cost Estimation Review

    OpenAIRE

    Ongere, Alphonce

    2013-01-01

    Software cost estimation is the process of predicting the effort, the time and the cost re-quired to complete software project successfully. It involves size measurement of the soft-ware project to be produced, estimating and allocating the effort, drawing the project schedules, and finally, estimating overall cost of the project. Accurate estimation of software project cost is an important factor for business and the welfare of software organization in general. If cost and effort estimat...

  10. Software Partitioning Technologies

    Science.gov (United States)

    2001-05-29

    1 Software Partitioning Technologies Tim Skutt Smiths Aerospace 3290 Patterson Ave. SE Grand Rapids, MI 49512-1991 (616) 241-8645 skutt_timothy...Limitation of Abstract UU Number of Pages 12 2 Agenda n Software Partitioning Overview n Smiths Software Partitioning Technology n Software Partitioning...Partition Level OS Core Module Level OS Timers MMU I/O API Layer Partitioning Services 6 Smiths Software Partitioning Technology n Smiths has developed

  11. Trust with Private and Common Property: Effects of Stronger Property Right Entitlements

    Directory of Open Access Journals (Sweden)

    James C. Cox

    2010-11-01

    Full Text Available Is mutually beneficial cooperation in trust games more prevalent with private property or common property? Does the strength of property right entitlement affect the answer? Cox, Ostrom, Walker, et al. [1] report little difference between cooperation in private and common property trust games. We assign stronger property right entitlements by requiring subjects to meet a performance quota in a real effort task to earn their endowments. We report experiment treatments with sequential choice and strategy responses. We find that cooperation is lower in common property trust games than in private property trust games, which is an idiosyncratic prediction of revealed altruism theory [2]. Demonstrable differences and similarities between our strategy response and sequential choice data provide insight into the how these protocols can yield different results from hypothesis tests even when they are eliciting the same behavioral patterns across treatments.

  12. Software Engineering Program: Software Process Improvement Guidebook

    Science.gov (United States)

    1996-01-01

    The purpose of this document is to provide experience-based guidance in implementing a software process improvement program in any NASA software development or maintenance community. This guidebook details how to define, operate, and implement a working software process improvement program. It describes the concept of the software process improvement program and its basic organizational components. It then describes the structure, organization, and operation of the software process improvement program, illustrating all these concepts with specific NASA examples. The information presented in the document is derived from the experiences of several NASA software organizations, including the SEL, the SEAL, and the SORCE. Their experiences reflect many of the elements of software process improvement within NASA. This guidebook presents lessons learned in a form usable by anyone considering establishing a software process improvement program within his or her own environment. This guidebook attempts to balance general and detailed information. It provides material general enough to be usable by NASA organizations whose characteristics do not directly match those of the sources of the information and models presented herein. It also keeps the ideas sufficiently close to the sources of the practical experiences that have generated the models and information.

  13. Payload software technology: Software technology development plan

    Science.gov (United States)

    1977-01-01

    Programmatic requirements for the advancement of software technology are identified for meeting the space flight requirements in the 1980 to 1990 time period. The development items are described, and software technology item derivation worksheets are presented along with the cost/time/priority assessments.

  14. Pragmatic Software Innovation

    DEFF Research Database (Denmark)

    Aaen, Ivan; Jensen, Rikke Hagensby

    2014-01-01

    We understand software innovation as concerned with introducing innovation into the development of software intensive systems, i.e. systems in which software development and/or integration are dominant considerations. Innovation is key in almost any strategy for competitiveness in existing markets......, for creating new markets, or for curbing rising public expenses, and software intensive systems are core elements in most such strategies. Software innovation therefore is vital for about every sector of the economy. Changes in software technologies over the last decades have opened up for experimentation...

  15. eSciMart: Web Platform for Scientific Software Marketplace

    Science.gov (United States)

    Kryukov, A. P.; Demichev, A. P.

    2016-10-01

    In this paper we suggest a design of a web marketplace where users of scientific application software and databases, presented in the form of web services, as well as their providers will have presence simultaneously. The model, which will be the basis for the web marketplace is close to the customer-to-customer (C2C) model, which has been successfully used, for example, on the auction sites such as eBay (ebay.com). Unlike the classical model of C2C the suggested marketplace focuses on application software in the form of web services, and standardization of API through which application software will be integrated into the web marketplace. A prototype of such a platform, entitled eSciMart, is currently being developed at SINP MSU.

  16. WILDFIRE IGNITION RESISTANCE ESTIMATOR WIZARD SOFTWARE DEVELOPMENT REPORT

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, M.; Robinson, C.; Gupta, N.; Werth, D.

    2012-10-10

    This report describes the development of a software tool, entitled “WildFire Ignition Resistance Estimator Wizard” (WildFIRE Wizard, Version 2.10). This software was developed within the Wildfire Ignition Resistant Home Design (WIRHD) program, sponsored by the U. S. Department of Homeland Security, Science and Technology Directorate, Infrastructure Protection & Disaster Management Division. WildFIRE Wizard is a tool that enables homeowners to take preventive actions that will reduce their home’s vulnerability to wildfire ignition sources (i.e., embers, radiant heat, and direct flame impingement) well in advance of a wildfire event. This report describes the development of the software, its operation, its technical basis and calculations, and steps taken to verify its performance.

  17. Agentic and communal narcissism and satisfaction with life: The mediating role of psychological entitlement and self-esteem.

    Science.gov (United States)

    Żemojtel-Piotrowska, Magdalena A; Piotrowski, Jarosław P; Maltby, John

    2015-12-22

    This study examined the mediational role of self-esteem (as an enhancement) and psychological entitlement (as a cost) in the relationship between an agentic-communal model of grandiose narcissism and satisfaction with life. Two hundred and forty-eight university undergraduate students completed measures of agentic and communal narcissism, self-esteem, psychological entitlement and satisfaction with life. The findings suggest that there is support for the usefulness of the agentic-communal model of narcissism, and, consistent with predictions in the wider literature, self-esteem and psychological entitlement mediated the relationship between agentic-communal narcissism and life satisfaction.

  18. Pragmatic Software Innovation

    DEFF Research Database (Denmark)

    Aaen, Ivan; Jensen, Rikke Hagensby

    2014-01-01

    We understand software innovation as concerned with introducing innovation into the development of software intensive systems, i.e. systems in which software development and/or integration are dominant considerations. Innovation is key in almost any strategy for competitiveness in existing markets......, for creating new markets, or for curbing rising public expenses, and software intensive systems are core elements in most such strategies. Software innovation therefore is vital for about every sector of the economy. Changes in software technologies over the last decades have opened up for experimentation......, learning, and flexibility in ongoing software projects, but how can this change be used to facilitate software innovation? How can a team systematically identify and pursue opportunities to create added value in ongoing projects? In this paper, we describe Deweyan pragmatism as the philosophical foundation...

  19. Software Engineering Improvement Plan

    Science.gov (United States)

    2006-01-01

    In performance of this task order, bd Systems personnel provided support to the Flight Software Branch and the Software Working Group through multiple tasks related to software engineering improvement and to activities of the independent Technical Authority (iTA) Discipline Technical Warrant Holder (DTWH) for software engineering. To ensure that the products, comments, and recommendations complied with customer requirements and the statement of work, bd Systems personnel maintained close coordination with the customer. These personnel performed work in areas such as update of agency requirements and directives database, software effort estimation, software problem reports, a web-based process asset library, miscellaneous documentation review, software system requirements, issue tracking software survey, systems engineering NPR, and project-related reviews. This report contains a summary of the work performed and the accomplishments in each of these areas.

  20. Paladin Software Support Lab

    Data.gov (United States)

    Federal Laboratory Consortium — The Paladin Software Support Environment (SSE) occupies 2,241 square-feet. It contains the hardware and software tools required to support the Paladin Automatic Fire...

  1. ATLAS software packaging

    CERN Document Server

    Rybkin, G

    2012-01-01

    Software packaging is indispensable part of build and prerequisite for deployment processes. Full ATLAS software stack consists of TDAQ, HLT, and Offline software. These software groups depend on some 80 external software packages. We present tools, package PackDist, developed and used to package all this software except for TDAQ project. PackDist is based on and driven by CMT, ATLAS software configuration and build tool, and consists of shell and Python scripts. The packaging unit used is CMT project. Each CMT project is packaged as several packages - platform dependent (one per platform available), source code excluding header files, other platform independent files, documentation, and debug information packages (the last two being built optionally). Packaging can be done recursively to package all the dependencies. The whole set of packages for one software release, distribution kit, also includes configuration packages and contains some 120 packages for one platform. Also packaged are physics analysis pro...

  2. Commercial Data Mining Software

    Science.gov (United States)

    Zhang, Qingyu; Segall, Richard S.

    This chapter discusses selected commercial software for data mining, supercomputing data mining, text mining, and web mining. The selected software are compared with their features and also applied to available data sets. The software for data mining are SAS Enterprise Miner, Megaputer PolyAnalyst 5.0, PASW (formerly SPSS Clementine), IBM Intelligent Miner, and BioDiscovery GeneSight. The software for supercomputing are Avizo by Visualization Science Group and JMP Genomics from SAS Institute. The software for text mining are SAS Text Miner and Megaputer PolyAnalyst 5.0. The software for web mining are Megaputer PolyAnalyst and SPSS Clementine . Background on related literature and software are presented. Screen shots of each of the selected software are presented, as are conclusions and future directions.

  3. Software Testing Requires Variability

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    2003-01-01

    Software variability is the ability of a software system or artefact to be changed, customized or configured for use in a particular context. Variability in software systems is important from a number of perspectives. Some perspectives rightly receive much attention due to their direct economic...... impact in software production. As is also apparent from the call for papers these perspectives focus on qualities such as reuse, adaptability, and maintainability....

  4. Software engineer's pocket book

    CERN Document Server

    Tooley, Michael

    2013-01-01

    Software Engineer's Pocket Book provides a concise discussion on various aspects of software engineering. The book is comprised of six chapters that tackle various areas of concerns in software engineering. Chapter 1 discusses software development, and Chapter 2 covers programming languages. Chapter 3 deals with operating systems. The book also tackles discrete mathematics and numerical computation. Data structures and algorithms are also explained. The text will be of great use to individuals involved in the specification, design, development, implementation, testing, maintenance, and qualit

  5. Software Testing Requires Variability

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    2003-01-01

    Software variability is the ability of a software system or artefact to be changed, customized or configured for use in a particular context. Variability in software systems is important from a number of perspectives. Some perspectives rightly receive much attention due to their direct economic...... impact in software production. As is also apparent from the call for papers these perspectives focus on qualities such as reuse, adaptability, and maintainability....

  6. Software engineering measurement

    CERN Document Server

    Munson, PhD, John C

    2003-01-01

    By demonstrating how to develop simple experiments for the empirical validation of theoretical research and showing how to convert measurement data into meaningful and valuable information, this text fosters more precise use of software measurement in the computer science and software engineering literature. Software Engineering Measurement shows you how to convert your measurement data to valuable information that can be used immediately for software process improvement.

  7. Software variability management

    NARCIS (Netherlands)

    Bosch, J; Nord, RL

    2004-01-01

    During recent years, the amount of variability that has to be supported by a software artefact is growing considerably and its management is evolving into a major challenge during development, usage, and evolution of software artefacts. Successful management of variability in software leads to

  8. Software Language Evolution

    NARCIS (Netherlands)

    Vermolen, S.D.

    2012-01-01

    Software plays a critical role in our daily life. Vast amounts of money are spent on more and more complex systems. All software, regardless if it controls a plane or the game on your phone is never finished. Software changes when it contains bugs or when new functionality is added. This process of

  9. Software Architecture Evolution

    Science.gov (United States)

    Barnes, Jeffrey M.

    2013-01-01

    Many software systems eventually undergo changes to their basic architectural structure. Such changes may be prompted by new feature requests, new quality attribute requirements, changing technology, or other reasons. Whatever the causes, architecture evolution is commonplace in real-world software projects. Today's software architects, however,…

  10. Java for flight software

    Science.gov (United States)

    Benowitz, E.; Niessner, A.

    2003-01-01

    This work involves developing representative mission-critical spacecraft software using the Real-Time Specification for Java (RTSJ). This work currently leverages actual flight software used in the design of actual flight software in the NASA's Deep Space 1 (DSI), which flew in 1998.

  11. Software Language Evolution

    NARCIS (Netherlands)

    Vermolen, S.D.

    2012-01-01

    Software plays a critical role in our daily life. Vast amounts of money are spent on more and more complex systems. All software, regardless if it controls a plane or the game on your phone is never finished. Software changes when it contains bugs or when new functionality is added. This process of

  12. Software Engineering for Portability.

    Science.gov (United States)

    Stanchev, Ivan

    1990-01-01

    Discussion of the portability of educational software focuses on the software design and development process. Topics discussed include levels of portability; the user-computer dialog; software engineering principles; design techniques for student performance records; techniques of courseware programing; and suggestions for further research and…

  13. Software Architecture Evolution

    Science.gov (United States)

    Barnes, Jeffrey M.

    2013-01-01

    Many software systems eventually undergo changes to their basic architectural structure. Such changes may be prompted by new feature requests, new quality attribute requirements, changing technology, or other reasons. Whatever the causes, architecture evolution is commonplace in real-world software projects. Today's software architects, however,…

  14. Software Maintenance Success Recipes

    CERN Document Server

    Reifer, Donald J

    2011-01-01

    Dispelling much of the folklore surrounding software maintenance, Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do their work and instructs on the methods required to achieve success. Donald J. Reifer--an award winner for his contributions to the field of software engineering and whose experience includes managing the DoD Software Initiatives Office--provides step-by-step guidance on how t

  15. Funding Research Software Development

    Science.gov (United States)

    Momcheva, Ivelina G.

    2017-01-01

    Astronomical software is used by each and every member of our scientific community. Purpose-build software is becoming ever more critical as we enter the regime of large datasets and simulations of increasing complexity. However, financial investments in building, maintaining and renovating the software infrastructure have been uneven. In this talk I will summarize past and current funding sources for astronomical software development, discuss other models of funding and introduce a new initiative for supporting community software at STScI. The purpose of this talk is to prompt discussion about how we allocate resources to this vital infrastructure.

  16. Counterstatement to Article Entitled "A Framework for Evaluation of Marine Spatial Data Geoportals Using Case Studies"

    Directory of Open Access Journals (Sweden)

    Seip Christian

    2015-12-01

    Full Text Available In December 2014 in volume 60 issue 4 a paper was published entitled “A Framework for Evaluation of Marine Spatial Data Geoportals Using Case Studies” by Marina Tavra, Vlado Cetl and Tea Duplancic Leder which is suspected to constitute academic misconduct. This comment reasons that the core of the paper was taken from another source and thus does not offer new and original scientific work and therefore does not add knowledge to the body of science. Furthermore it argues that apart from the plagiarism the paper shows major weaknesses and thus should have not been published even it was not plagiarized.

  17. Effects of customer entitlement on service workers' physical and psychological well-being: a study of waitstaff employees.

    Science.gov (United States)

    Fisk, Glenda M; Neville, Lukas B

    2011-10-01

    This exploratory study examines the nature of customer entitlement and its impact on front-line service employees. In an open-ended qualitative inquiry, 56 individuals with waitstaff experience described the types of behaviors entitled customers engage in and the kinds of service-related "perks" these individuals feel deserving of. Participants explained how they responded to entitled customers, how and when managers became involved, and how their dealings with these patrons influenced their subjective physical and psychological well-being. We found that the behaviors of entitled customers negatively impacted waitstaff employees. Participants reported physiological arousal, negative affect, burnout, and feelings of dehumanization as a result of dealing with these patrons. While respondents drew on a variety of strategies to manage their encounters with entitled customers, they indicated workplace support was often informal and described feeling abandoned by management in dealing with this workplace stressor. Approaching customer entitlement as a form of microaggression, we offer recommendations for practice and suggest new directions for future research. . (PsycINFO Database Record (c) 2011 APA, all rights reserved).

  18. Software Maintenance and Evolution: The Implication for Software ...

    African Journals Online (AJOL)

    PROF. O. E. OSUAGWU

    2013-06-01

    Jun 1, 2013 ... ... the test of time. Keywords: Software, software maintenance, software evolution, reverse engineering, ... area of human endeavour be it automobile, software, etc. at .... greater efficiency and productivity in the maintenance ...

  19. NASA software documentation standard software engineering program

    Science.gov (United States)

    1991-01-01

    The NASA Software Documentation Standard (hereinafter referred to as Standard) can be applied to the documentation of all NASA software. This Standard is limited to documentation format and content requirements. It does not mandate specific management, engineering, or assurance standards or techniques. This Standard defines the format and content of documentation for software acquisition, development, and sustaining engineering. Format requirements address where information shall be recorded and content requirements address what information shall be recorded. This Standard provides a framework to allow consistency of documentation across NASA and visibility into the completeness of project documentation. This basic framework consists of four major sections (or volumes). The Management Plan contains all planning and business aspects of a software project, including engineering and assurance planning. The Product Specification contains all technical engineering information, including software requirements and design. The Assurance and Test Procedures contains all technical assurance information, including Test, Quality Assurance (QA), and Verification and Validation (V&V). The Management, Engineering, and Assurance Reports is the library and/or listing of all project reports.

  20. The Design of a Stand-Alone Division Tactics Simulator Utilizing Non-Proprietary (Open Source) Media and Iterative Development

    Science.gov (United States)

    2006-03-01

    http://www.dlib.org/ dlib /february02/kirriemuir/ 02kirriemuir.html 15. Amory, A., Naicker, K., Vincent, J. and Adams, C., “The use of Computer Games...Lib Magazine [online magazine]. February 2002 [cited 20 December 2005]. Available from the World Wide Web http://www.dlib.org/ dlib /february02

  1. Economic Entitlements via Entrepreneurial Conduct? Women and Financial Inclusion in Neo-liberal India

    Directory of Open Access Journals (Sweden)

    K. Kalpana

    2015-08-01

    Full Text Available This paper examines the gendered local character of neoliberalism at the household level by focusing on microcredit/finance programs in India. Microfinance promoted by the state as an informal activity targeting women is intended to alleviate income inequalities, even as it contributes to maintaining the world capitalist system. In India the inception of microfinance-based Self Help Groups (SHGs or peer groups of women savers and borrowers in the 1990s has coincided with a rightward turn towards neoliberal policies of structural adjustment, privatization and economic deregulation. In this paper, I show how Indian policy makers have endeavored to make women's economic entitlements contingent upon their disciplined financial behavior and their willing participation in neoliberal agendas of creating and deepening 'self-regulating' markets at village levels. Drawing on an ethnographic study conducted in a South Indian state, I show that the community level 'neoliberal disciplining' that microfinance entails does not proceed without resistance. Whilst SHGs seek to constitute women as fiscally disciplined savers and borrowers, women stake their 'rightful' entitlement to bank credit even as they reject outright the entrepreneurial subjectivities they are expected to assume. They pursue purposes and ends that extend well beyond 'financial inclusion.'

  2. The Making of a Good Woman: Extended Parental Leave Entitlements and Mothers' Work Commitment in Germany.

    Science.gov (United States)

    Gangl, Markus; Ziefle, Andrea

    2015-09-01

    The authors investigate the relationship between family policy and women's attachment to the labor market, focusing specifically on policy feedback on women's subjective work commitment. They utilize a quasi-experimental design to identify normative policy effects from changes in mothers' work commitment in conjunction with two policy changes that significantly extended the length of statutory parental leave entitlements in Germany. Using unique survey data from the German Socio-Economic Panel and difference-in-differences, triple-differenced, and instrumental variables estimators for panel data, they obtain consistent empirical evidence that increasing generosity of leave entitlements led to a decline in mothers' work commitment in both East and West Germany. They also probe potential mediating mechanisms and find strong evidence for role exposure and norm setting effects. Finally, they demonstrate that policy-induced shifts in mothers' preferences have contributed to. retarding women's labor force participation after childbirth in Germany, especially as far as mothers' return to full-time employment is concerned.

  3. Software Defined Networking Demands on Software Technologies

    DEFF Research Database (Denmark)

    Galinac Grbac, T.; Caba, Cosmin Marius; Soler, José

    2015-01-01

    Software Defined Networking (SDN) is a networking approach based on a centralized control plane architecture with standardised interfaces between control and data planes. SDN enables fast configuration and reconfiguration of the network to enhance resource utilization and service performances....... This new approach enables a more dynamic and flexible network, which may adapt to user needs and application requirements. To this end, systemized solutions must be implemented in network software, aiming to provide secure network services that meet the required service performance levels. In this paper......, we review this new approach to networking from an architectural point of view, and identify and discuss some critical quality issues that require new developments in software technologies. These issues we discuss along with use case scenarios. Here in this paper we aim to identify challenges...

  4. Trace Software Pipelining

    Institute of Scientific and Technical Information of China (English)

    王剑; AndreasKrall; 等

    1995-01-01

    Global software pipelining is a complex but efficient compilation technique to exploit instruction-level parallelism for loops with branches.This paper presents a novel global software pipelining technique,called Trace Software Pipelining,targeted to the instruction-level parallel processors such as Very Long Instruction Word (VLIW) and superscalar machines.Trace software pipelining applies a global code scheduling technique to compact the original loop body.The resulting loop is called a trace software pipelined (TSP) code.The trace softwrae pipelined code can be directly executed with special architectural support or can be transformed into a globally software pipelined loop for the current VLIW and superscalar processors.Thus,exploiting parallelism across all iterations of a loop can be completed through compacting the original loop body with any global code scheduling technique.This makes our new technique very promising in practical compilers.Finally,we also present the preliminary experimental results to support our new approach.

  5. COTS software selection process.

    Energy Technology Data Exchange (ETDEWEB)

    Watkins, William M. (Strike Wire Technologies, Louisville, CO); Lin, Han Wei; McClelland, Kelly (U.S. Security Associates, Livermore, CA); Ullrich, Rebecca Ann; Khanjenoori, Soheil; Dalton, Karen; Lai, Anh Tri; Kuca, Michal; Pacheco, Sandra; Shaffer-Gant, Jessica

    2006-05-01

    Today's need for rapid software development has generated a great interest in employing Commercial-Off-The-Shelf (COTS) software products as a way of managing cost, developing time, and effort. With an abundance of COTS software packages to choose from, the problem now is how to systematically evaluate, rank, and select a COTS product that best meets the software project requirements and at the same time can leverage off the current corporate information technology architectural environment. This paper describes a systematic process for decision support in evaluating and ranking COTS software. Performed right after the requirements analysis, this process provides the evaluators with more concise, structural, and step-by-step activities for determining the best COTS software product with manageable risk. In addition, the process is presented in phases that are flexible to allow for customization or tailoring to meet various projects' requirements.

  6. Social software in global software development

    DEFF Research Database (Denmark)

    2010-01-01

    Social software (SoSo) is defined by Farkas as tools that (1) allow people to communicate, collaborate, and build community online (2) can be syndicated, shared, reused or remixed and (3) let people learn easily from and capitalize on the behavior and knowledge of others. [1]. SoSo include a wide...... variety of tools such as: instant messaging, internet forums, mailing lists, blogs, wikis, social network sites, social bookmarking, social libraries, virtual worlds. Though normally rather belonging to the private realm, the use of social software in corporate context has been reported, e.g. as a way...

  7. Social software in global software development

    DEFF Research Database (Denmark)

    2010-01-01

    Social software (SoSo) is defined by Farkas as tools that (1) allow people to communicate, collaborate, and build community online (2) can be syndicated, shared, reused or remixed and (3) let people learn easily from and capitalize on the behavior and knowledge of others. [1]. SoSo include a wide...... variety of tools such as: instant messaging, internet forums, mailing lists, blogs, wikis, social network sites, social bookmarking, social libraries, virtual worlds. Though normally rather belonging to the private realm, the use of social software in corporate context has been reported, e.g. as a way...

  8. Software Quality Assurance in Software Projects: A Study of Pakistan

    Directory of Open Access Journals (Sweden)

    Faisal Shafique Butt

    2013-05-01

    Full Text Available Software quality is specific property which tells what kind of standard software should have. In a software project, quality is the key factor of success and decline of software related organization. Many researches have been done regarding software quality. Software related organization follows standards introduced by Capability Maturity Model Integration (CMMI to achieve good quality software. Quality is divided into three main layers which are Software Quality Assurance (SQA, Software Quality Plan (SQP and Software Quality Control (SQC. So In this study, we are discussing the quality standards and principles of software projects in Pakistan software Industry and how these implemented quality standards are measured and managed. In this study, we will see how many software firms are following the rules of CMMI to create software. How many are reaching international standards and how many firms are measuring the quality of their projects. The results show some of the companies are using software quality assurance techniques in Pakstan.

  9. Software engineering the current practice

    CERN Document Server

    Rajlich, Vaclav

    2011-01-01

    INTRODUCTION History of Software EngineeringSoftware PropertiesOrigins of SoftwareBirth of Software EngineeringThird Paradigm: Iterative ApproachSoftware Life Span ModelsStaged ModelVariants of Staged ModelSoftware Technologies Programming Languages and CompilersObject-Oriented TechnologyVersion Control SystemSoftware ModelsClass DiagramsUML Activity DiagramsClass Dependency Graphs and ContractsSOFTWARE CHANGEIntroduction to Software ChangeCharacteristics of Software ChangePhases of Software ChangeRequirements and Their ElicitationRequirements Analysis and Change InitiationConcepts and Concept

  10. Real World Software Engineering

    Science.gov (United States)

    1994-07-15

    semester addresses the remaining principles of a complete, mature software development process [ Humphrey 88]. In order to provide an instructional...Software Innovations Technology, 1083 Mandarin Drive N.E.. Palm Bay FL 32905-4706 [ Humphrey 88] W. S. Humphrey , "Characterizing the Software Process: A...Copies of all the forms mentioned are available via electronic mail from the authors. 40 [1) Doris Carver, "Comparison of Techniques In Project-Based

  11. Software configuration management

    CERN Document Server

    Keyes, Jessica

    2004-01-01

    Software Configuration Management discusses the framework from a standards viewpoint, using the original DoD MIL-STD-973 and EIA-649 standards to describe the elements of configuration management within a software engineering perspective. Divided into two parts, the first section is composed of 14 chapters that explain every facet of configuration management related to software engineering. The second section consists of 25 appendices that contain many valuable real world CM templates.

  12. Software Process Improvement Defined

    DEFF Research Database (Denmark)

    Aaen, Ivan

    2002-01-01

    This paper argues in favor of the development of explanatory theory on software process improvement. The last one or two decades commitment to prescriptive approaches in software process improvement theory may contribute to the emergence of a gulf dividing theorists and practitioners....... It is proposed that this divide be met by the development of theory evaluating prescriptive approaches and informing practice with a focus on the software process policymaking and process control aspects of improvement efforts...

  13. Software evolution with XVCL

    DEFF Research Database (Denmark)

    Zhang, Weishan; Jarzabek, Stan; Zhang, Hongyu

    2004-01-01

    This chapter introduces software evolution with XVCL (XML-based Variant Configuration Language), which is an XML-based metaprogramming technique. As the software evolves, a large number of variants may arise, especially whtn such kinds of evolutions are related to multiple platforms as shown in our...... case study. Handling variants and tracing the impact of variants across the development lifecycle is a challenge. This chapter shows how we can maintain different versions of software in a reuse-based way....

  14. Software systems for astronomy

    CERN Document Server

    Conrad, Albert R

    2014-01-01

    This book covers the use and development of software for astronomy. It describes the control systems used to point the telescope and operate its cameras and spectrographs, as well as the web-based tools used to plan those observations. In addition, the book also covers the analysis and archiving of astronomical data once it has been acquired. Readers will learn about existing software tools and packages, develop their own software tools, and analyze real data sets.

  15. Lean software development

    OpenAIRE

    Hefnerová, Lucie

    2011-01-01

    The main goal of this bachelor thesis is the emergence of the clear Czech written material concerning the concept of Lean Software Development, which has been gaining significant attention in the field of software development, recently. Another goal of this thesis is to summarize the possible approaches of categorizing the concept and to summarize the possible approaches of defining the relationship between Lean and Agile software development. The detailed categorization of the tools potentia...

  16. Essential software architecture

    CERN Document Server

    Gorton, Ian

    2011-01-01

    Job titles like ""Technical Architect"" and ""Chief Architect"" nowadays abound in software industry, yet many people suspect that ""architecture"" is one of the most overused and least understood terms in professional software development. Gorton's book tries to resolve this dilemma. It concisely describes the essential elements of knowledge and key skills required to be a software architect. The explanations encompass the essentials of architecture thinking, practices, and supporting technologies. They range from a general understanding of structure and quality attributes through technical i

  17. Software Process Improvement Defined

    DEFF Research Database (Denmark)

    Aaen, Ivan

    2002-01-01

    This paper argues in favor of the development of explanatory theory on software process improvement. The last one or two decades commitment to prescriptive approaches in software process improvement theory may contribute to the emergence of a gulf dividing theorists and practitioners....... It is proposed that this divide be met by the development of theory evaluating prescriptive approaches and informing practice with a focus on the software process policymaking and process control aspects of improvement efforts...

  18. Solar Asset Management Software

    Energy Technology Data Exchange (ETDEWEB)

    Iverson, Aaron [Ra Power Management, Inc., Oakland, CA (United States); Zviagin, George [Ra Power Management, Inc., Oakland, CA (United States)

    2016-09-30

    Ra Power Management (RPM) has developed a cloud based software platform that manages the financial and operational functions of third party financed solar projects throughout their lifecycle. RPM’s software streamlines and automates the sales, financing, and management of a portfolio of solar assets. The software helps solar developers automate the most difficult aspects of asset management, leading to increased transparency, efficiency, and reduction in human error. More importantly, our platform will help developers save money by improving their operating margins.

  19. Software evolution and maintenance

    CERN Document Server

    Tripathy, Priyadarshi

    2014-01-01

    Software Evolution and Maintenance: A Practitioner's Approach is an accessible textbook for students and professionals, which collates the advances in software development and provides the most current models and techniques in maintenance.Explains two maintenance standards: IEEE/EIA 1219 and ISO/IEC14764Discusses several commercial reverse and domain engineering toolkitsSlides for instructors are available onlineInformation is based on the IEEE SWEBOK (Software Engineering Body of Knowledge)

  20. Software Architecture Technology Initiative

    Science.gov (United States)

    2008-04-01

    2008 Carnegie Mellon University 2008 PLS March 2008 © 2008 Carnegie Mellon University Software Architecture Technology Initiative SATURN 2008...SUBTITLE Software Architecture Technology Initiative 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...SUPPLEMENTARY NOTES presented at the SEI Software Architecture Technology User Network (SATURN) Workshop, 30 Apr ? 1 May 2008, Pittsburgh, PA. 14

  1. Gammasphere software development

    Energy Technology Data Exchange (ETDEWEB)

    Piercey, R.B.

    1993-01-01

    Activities of the nuclear physics group are described. Progress was made in organizing the Gammasphere Software Working Group, establishing a nuclear computing facility, participating in software development at Lawrence Berkeley, developing a common data file format, and adapting the ORNL UPAK software to run at Gammasphere. A universal histogram object was developed that defines a file format and provides for an objective-oriented programming model. An automated liquid nitrogen fill system was developed for Gammasphere (110 Ge detectors comprise the sphere).

  2. Parallel Software Model Checking

    Science.gov (United States)

    2015-01-08

    JAN 2015 2. REPORT TYPE N/A 3. DATES COVERED 4. TITLE AND SUBTITLE Parallel Software Model Checking 5a. CONTRACT NUMBER 5b. GRANT NUMBER...AND ADDRESS(ES) Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 8. PERFORMING ORGANIZATION REPORT NUMBER 9...3: ∧ ≥ 10 ∧ ≠ 10 ⇒ : Parallel Software Model Checking Team Members Sagar Chaki, Arie Gurfinkel

  3. Gammasphere software development

    Energy Technology Data Exchange (ETDEWEB)

    Piercey, R.B.

    1993-01-01

    Activities of the nuclear physics group are described. Progress was made in organizing the Gammasphere Software Working Group, establishing a nuclear computing facility, participating in software development at Lawrence Berkeley, developing a common data file format, and adapting the ORNL UPAK software to run at Gammasphere. A universal histogram object was developed that defines a file format and provides for an objective-oriented programming model. An automated liquid nitrogen fill system was developed for Gammasphere (110 Ge detectors comprise the sphere).

  4. Essence: Facilitating Software Innovation

    DEFF Research Database (Denmark)

    Aaen, Ivan

    2008-01-01

      This paper suggests ways to facilitate creativity and innovation in software development. The paper applies four perspectives – Product, Project, Process, and People –to identify an outlook for software innovation. The paper then describes a new facility–Software Innovation Research Lab (SIRL......) – and a new method concept for software innovation – Essence – based on views, modes, and team roles. Finally, the paper reports from an early experiment using SIRL and Essence and identifies further research....

  5. Global Software Engineering

    DEFF Research Database (Denmark)

    Ebert, Christof; Kuhrmann, Marco; Prikladnicki, Rafael

    2016-01-01

    Professional software products and IT systems and services today are developed mostly by globally distributed teams, projects, and companies. Successfully orchestrating Global Software Engineering (GSE) has become the major success factor both for organizations and practitioners. Yet, more than...... and experience reported at the IEEE International Conference on Software Engineering (ICGSE) series. The outcomes of our analysis show GSE as a field highly attached to industry and, thus, a considerable share of ICGSE papers address the transfer of Software Engineering concepts and solutions to the global stage...

  6. Agile software development

    CERN Document Server

    Dingsoyr, Torgeir; Moe, Nils Brede

    2010-01-01

    Agile software development has become an umbrella term for a number of changes in how software developers plan and coordinate their work, how they communicate with customers and external stakeholders, and how software development is organized in small, medium, and large companies, from the telecom and healthcare sectors to games and interactive media. Still, after a decade of research, agile software development is the source of continued debate due to its multifaceted nature and insufficient synthesis of research results. Dingsoyr, Dyba, and Moe now present a comprehensive snapshot of the kno

  7. Software architecture 1

    CERN Document Server

    Oussalah , Mourad Chabane

    2014-01-01

    Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural template

  8. Managing Software Process Evolution

    DEFF Research Database (Denmark)

    This book focuses on the design, development, management, governance and application of evolving software processes that are aligned with changing business objectives, such as expansion to new domains or shifting to global production. In the context of an evolving business world, it examines...... essential insights and tips to help readers manage process evolutions. And last but not least, it provides a wealth of examples and cases on how to deal with software evolution in practice. Reflecting these topics, the book is divided into three parts. Part 1 focuses on software business transformation...... the organization and management of (software development) projects and process improvements projects....

  9. Global Software Engineering

    DEFF Research Database (Denmark)

    Ebert, Christof; Kuhrmann, Marco; Prikladnicki, Rafael

    2016-01-01

    Professional software products and IT systems and services today are developed mostly by globally distributed teams, projects, and companies. Successfully orchestrating Global Software Engineering (GSE) has become the major success factor both for organizations and practitioners. Yet, more than...... and experience reported at the IEEE International Conference on Software Engineering (ICGSE) series. The outcomes of our analysis show GSE as a field highly attached to industry and, thus, a considerable share of ICGSE papers address the transfer of Software Engineering concepts and solutions to the global stage...

  10. Software architecture 2

    CERN Document Server

    Oussalah, Mourad Chabanne

    2014-01-01

    Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templa

  11. MYOB software for dummies

    CERN Document Server

    Curtis, Veechi

    2012-01-01

    Your complete guide to MYOB® AccountRight softwareNow in its seventh edition, MYOB® Software For Dummies walks you through everything you need to know, from starting your MYOB® file from scratch and recording payments and receipts, to tracking profit and analysing sales. This new edition includes all the information you need on the new generation of MYOB® AccountRight software, including the new cloud computing features. Set up MYOB® software - understand how to make it work the first time Keep track of purchases and sales - monitor customer accounts and ensure you get pai

  12. Teaching Social Software with Social Software

    Science.gov (United States)

    Mejias, Ulises

    2006-01-01

    Ulises Mejias examines how social software--information and communications technologies that facilitate the collaboration and exchange of ideas--enables students to participate in distributed research, an approach to learning in which knowledge is collectively constructed and shared. During Fall 2005, Mejias taught a graduate seminar that provided…

  13. ATLAS software packaging

    Science.gov (United States)

    Rybkin, Grigory

    2012-12-01

    Software packaging is indispensable part of build and prerequisite for deployment processes. Full ATLAS software stack consists of TDAQ, HLT, and Offline software. These software groups depend on some 80 external software packages. We present tools, package PackDist, developed and used to package all this software except for TDAQ project. PackDist is based on and driven by CMT, ATLAS software configuration and build tool, and consists of shell and Python scripts. The packaging unit used is CMT project. Each CMT project is packaged as several packages—platform dependent (one per platform available), source code excluding header files, other platform independent files, documentation, and debug information packages (the last two being built optionally). Packaging can be done recursively to package all the dependencies. The whole set of packages for one software release, distribution kit, also includes configuration packages and contains some 120 packages for one platform. Also packaged are physics analysis projects (currently 6) used by particular physics groups on top of the full release. The tools provide an installation test for the full distribution kit. Packaging is done in two formats for use with the Pacman and RPM package managers. The tools are functional on the platforms supported by ATLAS—GNU/Linux and Mac OS X. The packaged software is used for software deployment on all ATLAS computing resources from the detector and trigger computing farms, collaboration laboratories computing centres, grid sites, to physicist laptops, and CERN VMFS and covers the use cases of running all applications as well as of software development.

  14. Software for multistate analysis

    NARCIS (Netherlands)

    Willekens, Frans; Putter, H.

    2014-01-01

    Background: The growing interest in pathways, the increased availability of life-history data, innovations in statistical and demographic techniques, and advances in software technology have stimulated the development of software packages for multistate modeling of life histories. Objective: In the

  15. Software for multistate analysis

    NARCIS (Netherlands)

    Willekens, Frans; Putter, H.

    2014-01-01

    Background: The growing interest in pathways, the increased availability of life-history data, innovations in statistical and demographic techniques, and advances in software technology have stimulated the development of software packages for multistate modeling of life histories.Objective: In the

  16. Software evolution with XVCL

    DEFF Research Database (Denmark)

    Zhang, Weishan; Jarzabek, Stan; Zhang, Hongyu

    2004-01-01

    This chapter introduces software evolution with XVCL (XML-based Variant Configuration Language), which is an XML-based metaprogramming technique. As the software evolves, a large number of variants may arise, especially whtn such kinds of evolutions are related to multiple platforms as shown in o...

  17. Software Project Management

    Science.gov (United States)

    1989-07-01

    on software management obstacles and ways Chakrabarty, which held that genetically altered to cope with them are presented. Standardization is... algorith - MacProject89 mic models used to estimate software costs (SLIM, MacProject 11. Claris Corp., Mountain View, Calif., COCOMO, Function Points

  18. Software Quality Metrics

    Science.gov (United States)

    1991-07-01

    March 1979, pp. 121-128. Gorla, Narasimhaiah, Alan C. Benander, and Barbara A. Benander, "Debugging Effort Estimation Using Software Metrics", IEEE...Society, IEEE Guide for the Use of IEEE Standard Dictionary of Measures to Produce Reliable Software, IEEE Std 982.2-1988, June 1989. Jones, Capers

  19. Software Engineering Education Directory

    Science.gov (United States)

    1989-02-01

    The C Programming Language by Kernighan, Brian W. and Ritchie, Dennis M. Compilers: C Computers: NCR Tower 32/600 running UNIX System V...Sun Microsystems, Ada Eiffel 3B2) Software Testing CS 429 U P E O 10 Textbooks: Software Testing Techniques by Beizer, Boris Systems

  20. Marketing Mix del Software.

    Directory of Open Access Journals (Sweden)

    Yudith del Carmen Rodríguez Pérez

    2006-03-01

    Por ello, en este trabajo se define el concepto de producto software, se caracteriza al mismo y se exponen sus atributos de calidad. Además, se aborda la mezcla de marketing del software necesaria y diferente a la de otros productos para que este triunfe en el mercado.

  1. Software engineering ethics

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    Software engineering ethics is reviewed. The following subject areas are covered: lack of a system viewpoint; arrogance of PC DOS software vendors; violation od upward compatibility; internet worm; internet worm revisited; student cheating and company hiring interviews; computing practitioners and the commodity market; new projects and old programming languages; schedule and budget; and recent public domain comments.

  2. Software Assurance Competency Model

    Science.gov (United States)

    2013-03-01

    2010a]: Application of technologies and processes to achieve a required level of confidence that software systems and services function in the...for specific projects. L5: Analyze assurance technologies and contribute to the development of new ones. Assured Software Development L1

  3. Threats to Bitcoin Software

    OpenAIRE

    Kateraas, Christian H

    2014-01-01

    Collect and analyse threat models to the Bitcoin ecosystem and its software. The create misuse case, attack trees, and sequence diagrams of the threats. Create a malicious client from the gathered threat models. Once the development of the client is complete, test the client and evaluate its performance. From this, assess the security of the Bitcoin software.

  4. Software cost estimation

    NARCIS (Netherlands)

    Heemstra, F.J.

    1992-01-01

    The paper gives an overview of the state of the art of software cost estimation (SCE). The main questions to be answered in the paper are: (1) What are the reasons for overruns of budgets and planned durations? (2) What are the prerequisites for estimating? (3) How can software development effort be

  5. Cactus: Software Priorities

    Science.gov (United States)

    Hyde, Hartley

    2009-01-01

    The early eighties saw a period of rapid change in computing and teachers lost control of how they used computers in their classrooms. Software companies produced computer tools that looked so good that teachers forgot about writing their own classroom materials and happily purchased software--that offered much more than teachers needed--from…

  6. Selecting the Right Software.

    Science.gov (United States)

    Shearn, Joseph

    1987-01-01

    Selection of administrative software requires analyzing present needs and, to meet future needs, choosing software that will function with a more powerful computer system. Other important factors to include are a professional system demonstration, maintenance and training, and financial considerations that allow leasing or renting alternatives.…

  7. Systematic Software Development

    DEFF Research Database (Denmark)

    Kuhrmann, Marco; Méndez Fernández, Daniel

    2015-01-01

    The speed of innovation and the global allocation of resources to accelerate development or to reduce cost put pressure on the software industry. In the global competition, especially so-called high-price countries have to present arguments why the higher development cost is justified and what...... makes these countries an attractive host for software companies. Often, high-quality engineering and excellent quality of products, e.g., machinery and equipment, are mentioned. Yet, the question is: Can such arguments be also found for the software industry? We aim at investigating the degree...... of professionalism and systematization of software development to draw a map of strengths and weaknesses. To this end, we conducted as a first step an exploratory survey in Germany, presented in this paper. In this survey, we focused on the perceived importance of the two general software engineering process areas...

  8. Software architecture evolution

    DEFF Research Database (Denmark)

    Barais, Olivier; Le Meur, Anne-Francoise; Duchien, Laurence

    2008-01-01

    Software architectures must frequently evolve to cope with changing requirements, and this evolution often implies integrating new concerns. Unfortunately, when the new concerns are crosscutting, existing architecture description languages provide little or no support for this kind of evolution....... The software architect must modify multiple elements of the architecture manually, which risks introducing inconsistencies. This chapter provides an overview, comparison and detailed treatment of the various state-of-the-art approaches to describing and evolving software architectures. Furthermore, we discuss...... one particular framework named Tran SAT, which addresses the above problems of software architecture evolution. Tran SAT provides a new element in the software architecture descriptions language, called an architectural aspect, for describing new concerns and their integration into an existing...

  9. Software quality in 1997

    Energy Technology Data Exchange (ETDEWEB)

    Jones, C. [Software Productivity Research, Inc., Burlington, MA (United States)

    1997-11-01

    For many years, software quality assurance lagged behind hardware quality assurance in terms of methods, metrics, and successful results. New approaches such as Quality Function Deployment (QFD) the ISO 9000-9004 standards, the SEI maturity levels, and Total Quality Management (TQM) are starting to attract wide attention, and in some cases to bring software quality levels up to a parity with manufacturing quality levels. Since software is on the critical path for many engineered products, and for internal business systems as well, the new approaches are starting to affect global competition and attract widespread international interest. It can be hypothesized that success in mastering software quality will be a key strategy for dominating global software markets in the 21st century.

  10. Revisiting software ecosystems research

    DEFF Research Database (Denmark)

    Manikas, Konstantinos

    2016-01-01

    Software ecosystems’ is argued to first appear as a concept more than 10 years ago and software ecosystem research started to take off in 2010. We conduct a systematic literature study, based on the most extensive literature review in the field up to date, with two primarily aims: (a) to provide...... an updated overview of the field and (b) to document evolution in the field. In total, we analyze 231 papers from 2007 until 2014 and provide an overview of the research in software ecosystems. Our analysis reveals a field that is rapidly growing both in volume and empirical focus while becoming more mature...... from evolving. We propose means for future research and the community to address them. Finally, our analysis shapes the view of the field having evolved outside the existing definitions of software ecosystems and thus propose the update of the definition of software ecosystems....

  11. Software Requirements Management

    Directory of Open Access Journals (Sweden)

    Ali Altalbe

    2015-04-01

    Full Text Available Requirements are defined as the desired set of characteristics of a product or a service. In the world of software development, it is estimated that more than half of the failures are attributed towards poor requirements management. This means that although the software functions correctly, it is not what the client requested. Modern software requirements management methodologies are available to reduce the occur-rence of such incidents. This paper performs a review on the available literature in the area while tabulating possible methods of managing requirements. It also highlights the benefits of following a proper guideline for the requirements management task. With the introduction of specific software tools for the requirements management task, better software products are now been developed with lesser resources.

  12. Software licenses: Stay honest!

    CERN Document Server

    Computer Security Team

    2012-01-01

    Do you recall our article about copyright violation in the last issue of the CERN Bulletin, “Music, videos and the risk for CERN”? Now let’s be more precise. “Violating copyright” not only means the illegal download of music and videos, it also applies to software packages and applications.   Users must respect proprietary rights in compliance with the CERN Computing Rules (OC5). Not having legitimately obtained a program or the required licenses to run that software is not a minor offense. It violates CERN rules and puts the Organization at risk! Vendors deserve credit and compensation. Therefore, make sure that you have the right to use their software. In other words, you have bought the software via legitimate channels and use a valid and honestly obtained license. This also applies to “Shareware” and software under open licenses, which might also come with a cost. Usually, only “Freeware” is complete...

  13. Software safety hazard analysis

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence, J.D. [Lawrence Livermore National Lab., CA (United States)

    1996-02-01

    Techniques for analyzing the safety and reliability of analog-based electronic protection systems that serve to mitigate hazards in process control systems have been developed over many years, and are reasonably well understood. An example is the protection system in a nuclear power plant. The extension of these techniques to systems which include digital computers is not well developed, and there is little consensus among software engineering experts and safety experts on how to analyze such systems. One possible technique is to extend hazard analysis to include digital computer-based systems. Software is frequently overlooked during system hazard analyses, but this is unacceptable when the software is in control of a potentially hazardous operation. In such cases, hazard analysis should be extended to fully cover the software. A method for performing software hazard analysis is proposed in this paper.

  14. Developing Software Simulations

    Directory of Open Access Journals (Sweden)

    Tom Hall

    2007-06-01

    Full Text Available Programs in education and business often require learners to develop and demonstrate competence in specified areas and then be able to effectively apply this knowledge. One method to aid in developing a skill set in these areas is through the use of software simulations. These simulations can be used for learner demonstrations of competencies in a specified course as well as a review of the basic skills at the beginning of subsequent courses. The first section of this paper discusses ToolBook, the software used to develop our software simulations. The second section discusses the process of developing software simulations. The third part discusses how we have used software simulations to assess student knowledge of research design by providing simulations that allow the student to practice using SPSS and Excel.

  15. DIVERSIFICATION IN SOFTWARE ENGINEERING

    Directory of Open Access Journals (Sweden)

    Er.Kirtesh Jailia,

    2010-06-01

    Full Text Available In this paper we examine the factors that have promoted the iversification of software process models. The intention is to understand more clearly the problem-solving process in software engineering & try to find out the efficient way to manage the risk. A review of software process modeling is given first, followed by a discussion of process evaluation techniques. A taxonomy for categorizing process models, based on establishing decision criteria,is identified that can guide selecting the appropriate model from a set of alternatives on the basis of model characteristics and software project needs. We are proposing a model in this paper, for dealing with the diversification in software engineering.

  16. Trends in software testing

    CERN Document Server

    Mohanty, J; Balakrishnan, Arunkumar

    2017-01-01

    This book is focused on the advancements in the field of software testing and the innovative practices that the industry is adopting. Considering the widely varied nature of software testing, the book addresses contemporary aspects that are important for both academia and industry. There are dedicated chapters on seamless high-efficiency frameworks, automation on regression testing, software by search, and system evolution management. There are a host of mathematical models that are promising for software quality improvement by model-based testing. There are three chapters addressing this concern. Students and researchers in particular will find these chapters useful for their mathematical strength and rigor. Other topics covered include uncertainty in testing, software security testing, testing as a service, test technical debt (or test debt), disruption caused by digital advancement (social media, cloud computing, mobile application and data analytics), and challenges and benefits of outsourcing. The book w...

  17. AUTOMATED SOFTWARE DISTRIBUTION

    Directory of Open Access Journals (Sweden)

    J.J. Strasheim

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: Automated distribution of computer software via electronic means in large corporate networks is growing in popularity. The relative importance of personal computer software, in financial and logistical terms, is described and the developing need for automated software distribution explained. An actual comparitive example of alternative software distribution strategies is presented and discussed proving the viability of Electronic Software Distribution.

    AFRIKAANSE OPSOMMING: Geoutomatiseerde verspreiding van rekenaarprogrammatuur met behulp van elektroniese metodes in groot korporatiewe netwerke, is toenemend populer, Die relatiewe belangrikheid van persoonlike rekenaarprogrammatuur in finansiele en logistieke terme word bespreek en die groeiende behoefte na geoutomatiseerde programmatuurverspreiding verduidelik. 'n Werklike vergelykende voorbeeld van alternatiewe programmatuurverspreidingsstrategiee word aangebied en bespreek wat die lewensvatbaarheid van Elektroniese Programmatuurverspreiding bewys.

  18. Developing Software Simulations

    Directory of Open Access Journals (Sweden)

    Tom Hall

    2007-06-01

    Full Text Available Programs in education and business often require learners to develop and demonstrate competence in specified areas and then be able to effectively apply this knowledge. One method to aid in developing a skill set in these areas is through the use of software simulations. These simulations can be used for learner demonstrations of competencies in a specified course as well as a review of the basic skills at the beginning of subsequent courses. The first section of this paper discusses ToolBook, the software used to develop our software simulations. The second section discusses the process of developing software simulations. The third part discusses how we have used software simulations to assess student knowledge of research design by providing simulations that allow the student to practice using SPSS and Excel.

  19. Human Rights Discourse in the Sustainable Development Agenda Avoids Obligations and Entitlements

    Science.gov (United States)

    Williams, Carmel; Blaiklock, Alison

    2016-01-01

    Our commentary on Forman et al paper explores their thesis that right to health language can frame global health policy responses. We examined human rights discourse in the outcome documents from three 2015 United Nations (UN) summits and found rights-related terms are used in all three. However, a deeper examination of the discourse finds the documents do not convey the obligations and entitlements of human rights and international human rights law. The documents contain little that can be used to empower the participation of those already left behind and to hold States and the private sector to account for their human rights duties. This is especially worrying in a neoliberal era. PMID:27285518

  20. International conference entitled Zdeněk Kopal’s Binary Star Legacy

    CERN Document Server

    Drechsel, Horst; ZDENEK KOPAL’S BINARY STAR LEGACY

    2005-01-01

    An international conference entitled "Zdenek Kopal's Binary Star Legacy" was held on the occasion of the late Professor Kopal's 90th birthday in his home town of Litomyšl/Czech Republic and dedicated to the memory of one of the leading astronomers of the 20th century. Professor Kopal, who devoted 60 years of his scientific life to the exploration of close binary systems, initiated a breakthrough in this field with his description of binary components as non-spherical stars deformed by gravity, with surfaces following Roche equipotentials. Such knowledge triggered the development of new branches of astrophysics dealing with the structure and evolution of close binaries and the interaction effects displayed by exciting objects such as cataclysmic variables, symbiotic stars or X-ray binaries. Contributions to this conference included praise of the achievements of a great astronomer and personal reminiscences brought forward by Kopal's former students and colleagues, and reflected the state of the art of the dyn...

  1. [European paintings entitled "Jesus Christ as Pharmacist" in the Middle Ages and later].

    Science.gov (United States)

    Okuda, J

    2001-01-01

    Ninety-eight pictures painted in the Middle Ages and later entitled "Christ as Pharmacist" are shown in a little German book (W. H. Hein, Christus als Apotheker, Govi-Verlag, Frankfurt am Main, 1974). In the three paintings shown here, Christ appears as a pharmacist standing behind a pharmacy table used to compound medicine, and he has a medicinal balance in his left hand. The Christian terms, such as faith, love, and hope, and the drug's name are written on each of the drug vase labels. It seems that the purpose of displaying these paintings in a pharmacy was both to propagate Christianity to the poor who bought medicine at their family pharmacy and to win their respect for the pharmacist.

  2. Scientific Software Component Technology

    Energy Technology Data Exchange (ETDEWEB)

    Kohn, S.; Dykman, N.; Kumfert, G.; Smolinski, B.

    2000-02-16

    We are developing new software component technology for high-performance parallel scientific computing to address issues of complexity, re-use, and interoperability for laboratory software. Component technology enables cross-project code re-use, reduces software development costs, and provides additional simulation capabilities for massively parallel laboratory application codes. The success of our approach will be measured by its impact on DOE mathematical and scientific software efforts. Thus, we are collaborating closely with library developers and application scientists in the Common Component Architecture forum, the Equation Solver Interface forum, and other DOE mathematical software groups to gather requirements, write and adopt a variety of design specifications, and develop demonstration projects to validate our approach. Numerical simulation is essential to the science mission at the laboratory. However, it is becoming increasingly difficult to manage the complexity of modern simulation software. Computational scientists develop complex, three-dimensional, massively parallel, full-physics simulations that require the integration of diverse software packages written by outside development teams. Currently, the integration of a new software package, such as a new linear solver library, can require several months of effort. Current industry component technologies such as CORBA, JavaBeans, and COM have all been used successfully in the business domain to reduce software development costs and increase software quality. However, these existing industry component infrastructures will not scale to support massively parallel applications in science and engineering. In particular, they do not address issues related to high-performance parallel computing on ASCI-class machines, such as fast in-process connections between components, language interoperability for scientific languages such as Fortran, parallel data redistribution between components, and massively

  3. Global Software Engineering

    DEFF Research Database (Denmark)

    Ebert, Christof; Kuhrmann, Marco; Prikladnicki, Rafael

    2016-01-01

    SOFTWARE, LIKE ALL industry products, is the result of complex multinational supply chains with many partners from concept to development to production and maintenance. Global software engineering (GSE), IT outsourcing, and business process outsourcing during the past decade have showed growth...... rates of 10 to 20 percent per year. This instalment of Practitioner’s Digest summarizes experiences and guidance from industry to facilitate knowledge and technology transfer for GSE. It’s based on industry feedback from the annual IEEE International Conference on Global Software Engineering, which had...

  4. Management systems and software.

    Science.gov (United States)

    Levin, R P

    2001-02-01

    To ensure that your software optimizes your practice management systems, design systems that allow you and your team to achieve your goals and provide high levels of quality dentistry and customer service to your patients. Then use your current software system or purchase a new practice management software program that will allow your practice to operate within the guidelines of the systems which you have established. You can be certain that taking these steps will allow you to practice dentistry with maximum profitability and minimum stress for the remainder of your career.

  5. Advanced fingerprint verification software

    Science.gov (United States)

    Baradarani, A.; Taylor, J. R. B.; Severin, F.; Maev, R. Gr.

    2016-05-01

    We have developed a fingerprint software package that can be used in a wide range of applications from law enforcement to public and private security systems, and to personal devices such as laptops, vehicles, and door- locks. The software and processing units are a unique implementation of new and sophisticated algorithms that compete with the current best systems in the world. Development of the software package has been in line with the third generation of our ultrasonic fingerprinting machine1. Solid and robust performance is achieved in the presence of misplaced and low quality fingerprints.

  6. Software takes command

    CERN Document Server

    Manovich, Lev

    2013-01-01

    Software has replaced a diverse array of physical, mechanical, and electronic technologies used before 21st century to create, store, distribute and interact with cultural artifacts. It has become our interface to the world, to others, to our memory and our imagination - a universal language through which the world speaks, and a universal engine on which the world runs. What electricity and combustion engine were to the early 20th century, software is to the early 21st century. Offering the the first theoretical and historical account of software for media authoring and its effects on the prac

  7. CNEOST Control Software System

    Science.gov (United States)

    Wang, X.; Zhao, H. B.; Xia, Y.; Lu, H.; Li, B.

    2015-03-01

    In 2013, CNEOST (China Near Earth Object Survey Telescope) adapted its hardware system for the new CCD camera. Based on the new system architecture, the control software is re-designed and implemented. The software system adopts the message passing mechanism via WebSocket protocol, and improves its flexibility, expansibility, and scalability. The user interface with responsive web design realizes the remote operating under both desktop and mobile devices. The stable operating of software system has greatly enhanced the operation efficiency while reducing the complexity, and has also made a successful attempt for the future system design of telescope and telescope cloud.

  8. Speakeasy software development

    Science.gov (United States)

    Baskinger, Patricia J.; Ozarow, Larry; Chruscicki, Mary C.

    1993-08-01

    The Speakeasy Software Development Project had three primary objectives. The first objective was to perform Independent Verification and Validation (IV & V) of the software and documentation associated with the signal processor being developed by Hazeltine and TRW under the Speakeasy program. The IV & V task also included an analysis and assessment of the ability of the signal processor software to provide LPI communications functions. The second objective was to assist in the enhancement and modification of an existing Rome Lab signal processor workstation. Finally, TASC developed project management support tools and provided program management support to the Speakeasy Program Office.

  9. Error Free Software

    Science.gov (United States)

    1985-01-01

    A mathematical theory for development of "higher order" software to catch computer mistakes resulted from a Johnson Space Center contract for Apollo spacecraft navigation. Two women who were involved in the project formed Higher Order Software, Inc. to develop and market the system of error analysis and correction. They designed software which is logically error-free, which, in one instance, was found to increase productivity by 600%. USE.IT defines its objectives using AXES -- a user can write in English and the system converts to computer languages. It is employed by several large corporations.

  10. Guide to software export

    CERN Document Server

    Philips, Roger A

    2014-01-01

    An ideal reference source for CEOs, marketing and sales managers, sales consultants, and students of international marketing, Guide to Software Export provides a step-by-step approach to initiating or expanding international software sales. It teaches you how to examine critically your candidate product for exportability; how to find distributors, agents, and resellers abroad; how to identify the best distribution structure for export; and much, much more!Not content with providing just the guidelines for setting up, expanding, and managing your international sales channels, Guide to Software

  11. Software quality assurance handbook

    Energy Technology Data Exchange (ETDEWEB)

    1990-09-01

    There are two important reasons for Software Quality Assurance (SQA) at Allied-Signal Inc., Kansas City Division (KCD): First, the benefits from SQA make good business sense. Second, the Department of Energy has requested SQA. This handbook is one of the first steps in a plant-wide implementation of Software Quality Assurance at KCD. The handbook has two main purposes. The first is to provide information that you will need to perform software quality assurance activities. The second is to provide a common thread to unify the approach to SQA at KCD. 2 figs.

  12. Calidad de componentes software

    OpenAIRE

    2010-01-01

    En los últimos años se constata una tendencia creciente por parte de las organizaciones a desarrollar sus sistemas software mediante la combinación de componentes, en lugar de desarrollar dichos sistemas partiendo de cero. Esta tendencia es debida a varios factores. Entre ellos cabe destacar: la necesidad de las organizaciones de reducir los costes y el tiempo dedicados al desarrollo de los sistemas software; el crecimiento del mercado de componentes software; la reducción de la distancia ent...

  13. Beginning software engineering

    CERN Document Server

    Stephens, Rod

    2015-01-01

    Beginning Software Engineering demystifies the software engineering methodologies and techniques that professional developers use to design and build robust, efficient, and consistently reliable software. Free of jargon and assuming no previous programming, development, or management experience, this accessible guide explains important concepts and techniques that can be applied to any programming language. Each chapter ends with exercises that let you test your understanding and help you elaborate on the chapter's main concepts. Everything you need to understand waterfall, Sashimi, agile, RAD, Scrum, Kanban, Extreme Programming, and many other development models is inside!

  14. A Novel Software Evolution Model Based on Software Networks

    Science.gov (United States)

    Pan, Weifeng; Li, Bing; Ma, Yutao; Liu, Jing

    Many published papers analyzed the forming mechanisms and evolution laws of OO software systems from software reuse, software pattern, etc. There, however, have been fewer models so far merely built on the software components such as methods, classes, etc. and their interactions. In this paper, a novel Software Evolution Model based on Software Networks (called SEM-SN) is proposed. It uses software network at class level to represent software systems, and uses software network’s dynamical generating process to simulate activities in real software development process such as new classes’ dynamical creations and their dynamical interactions with already existing classes. It also introduces the concept of node/edge ageing to describe the decaying of classes with time. Empirical results on eight open-source Object-Oriented (OO) software systems demonstrate that SCM-SN roughly describes the evolution process of software systems and the emergence of their complex network characteristics.

  15. Project Portfolio Management Software

    OpenAIRE

    Paul POCATILU

    2006-01-01

    In order to design a methodology for the development of project portfolio management (PPM) applications, the existing applications have to be studied. This paper describes the main characteristics of the leading project portfolio management software applications.

  16. Project Portfolio Management Software

    Directory of Open Access Journals (Sweden)

    Paul POCATILU

    2006-01-01

    Full Text Available In order to design a methodology for the development of project portfolio management (PPM applications, the existing applications have to be studied. This paper describes the main characteristics of the leading project portfolio management software applications.

  17. Test af Software

    DEFF Research Database (Denmark)

    Dette dokument udgør slutrapporten for netværkssamarbejdet ”Testnet”, som er udført i perioden 1.4.2006 til 31.12.2008. Netværket beskæftiger sig navnlig med emner inden for test af indlejret og teknisk software, men et antal eksempler på problemstillinger og løsninger forbundet med test af...... administrativ software indgår også. Rapporten er opdelt i følgende 3 dele: Overblik. Her giver vi et resumé af netværkets formål, aktiviteter og resultater. State of the art af software test ridses op. Vi omtaler, at CISS og netværket tager nye tiltag. Netværket. Formål, deltagere og behandlede emner på ti...... række danske software-, elektronik- og IT-virksomheder....

  18. Tier2 Submit Software

    Science.gov (United States)

    Download this tool for Windows or Mac, which helps facilities prepare a Tier II electronic chemical inventory report. The data can also be exported into the CAMEOfm (Computer-Aided Management of Emergency Operations) emergency planning software.

  19. ACS: ALMA Common Software

    Science.gov (United States)

    Chiozzi, Gianluca; Šekoranja, Matej

    2013-02-01

    ALMA Common Software (ACS) provides a software infrastructure common to all ALMA partners and consists of a documented collection of common patterns and components which implement those patterns. The heart of ACS is based on a distributed Component-Container model, with ACS Components implemented as CORBA objects in any of the supported programming languages. ACS provides common CORBA-based services such as logging, error and alarm management, configuration database and lifecycle management. Although designed for ALMA, ACS can and is being used in other control systems and distributed software projects, since it implements proven design patterns using state of the art, reliable technology. It also allows, through the use of well-known standard constructs and components, that other team members whom are not authors of ACS easily understand the architecture of software modules, making maintenance affordable even on a very large project.

  20. Spreadsheet Auditing Software

    CERN Document Server

    Nixon, David

    2010-01-01

    It is now widely accepted that errors in spreadsheets are both common and potentially dangerous. Further research has taken place to investigate how frequently these errors occur, what impact they have, how the risk of spreadsheet errors can be reduced by following spreadsheet design guidelines and methodologies, and how effective auditing of a spreadsheet is in the detection of these errors. However, little research exists to establish the usefulness of software tools in the auditing of spreadsheets. This paper documents and tests office software tools designed to assist in the audit of spreadsheets. The test was designed to identify the success of software tools in detecting different types of errors, to identify how the software tools assist the auditor and to determine the usefulness of the tools.

  1. Test af Software

    DEFF Research Database (Denmark)

    Dette dokument udgør slutrapporten for netværkssamarbejdet ”Testnet”, som er udført i perioden 1.4.2006 til 31.12.2008. Netværket beskæftiger sig navnlig med emner inden for test af indlejret og teknisk software, men et antal eksempler på problemstillinger og løsninger forbundet med test af...... administrativ software indgår også. Rapporten er opdelt i følgende 3 dele: Overblik. Her giver vi et resumé af netværkets formål, aktiviteter og resultater. State of the art af software test ridses op. Vi omtaler, at CISS og netværket tager nye tiltag. Netværket. Formål, deltagere og behandlede emner på ti...... række danske software-, elektronik- og IT-virksomheder....

  2. Software For Genetic Algorithms

    Science.gov (United States)

    Wang, Lui; Bayer, Steve E.

    1992-01-01

    SPLICER computer program is genetic-algorithm software tool used to solve search and optimization problems. Provides underlying framework and structure for building genetic-algorithm application program. Written in Think C.

  3. Computer Center: Software Review.

    Science.gov (United States)

    Duhrkopf, Richard, Ed.; Belshe, John F., Ed.

    1988-01-01

    Reviews a software package, "Mitosis-Meiosis," available for Apple II or IBM computers with colorgraphics capabilities. Describes the documentation, presentation and flexibility of the program. Rates the program based on graphics and usability in a biology classroom. (CW)

  4. Error-Free Software

    Science.gov (United States)

    1989-01-01

    001 is an integrated tool suited for automatically developing ultra reliable models, simulations and software systems. Developed and marketed by Hamilton Technologies, Inc. (HTI), it has been applied in engineering, manufacturing, banking and software tools development. The software provides the ability to simplify the complex. A system developed with 001 can be a prototype or fully developed with production quality code. It is free of interface errors, consistent, logically complete and has no data or control flow errors. Systems can be designed, developed and maintained with maximum productivity. Margaret Hamilton, President of Hamilton Technologies, also directed the research and development of USE.IT, an earlier product which was the first computer aided software engineering product in the industry to concentrate on automatically supporting the development of an ultrareliable system throughout its life cycle. Both products originated in NASA technology developed under a Johnson Space Center contract.

  5. Collaborative software development

    NARCIS (Netherlands)

    Jonge, M. de; Visser, E.; Visser, J.M.W.

    2001-01-01

    We present an approach to collaborative software development where obtaining components and contributing components across organizational boundaries are explicit phases in the development process. A lightweight generative infrastructure supports this approach with an online package base, and several

  6. Core Flight Software Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The mission of the CFS project is to provide reusable software in support of human space exploration programs.   The top-level technical approach to...

  7. TMT common software update

    Science.gov (United States)

    Gillies, Kim; Brighton, Allan; Buur, Hanne

    2016-08-01

    TMT Common Software (CSW). CSW consists of software services and library code that is used by developers to create the subsystems and components that participate in the software system. CSW also defines the types of components that can be constructed and their functional roles in the software system. TMT CSW has recently passed its preliminary design review. The unique features of CSW include its use of multiple, open-source products as the basis for services, and an approach that works to reduce the amount of CSW-provided infrastructure code. Considerable prototyping was completed during this phase to mitigate risk with results that demonstrate the validity of this design approach and the selected service implementation products. This paper describes the latest design of TMT CSW, key features, and results from the prototyping effort.

  8. Advanced Software Protection Now

    CERN Document Server

    Bendersky, Diego; Notarfrancesco, Luciano; Sarraute, Carlos; Waissbein, Ariel

    2010-01-01

    Software digital rights management is a pressing need for the software development industry which remains, as no practical solutions have been acclamaimed succesful by the industry. We introduce a novel software-protection method, fully implemented with today's technologies, that provides traitor tracing and license enforcement and requires no additional hardware nor inter-connectivity. Our work benefits from the use of secure triggers, a cryptographic primitive that is secure assuming the existence of an ind-cpa secure block cipher. Using our framework, developers may insert license checks and fingerprints, and obfuscate the code using secure triggers. As a result, this rises the cost that software analysis tools have detect and modify protection mechanisms. Thus rising the complexity of cracking this system.

  9. Banking Software Applications Security

    Directory of Open Access Journals (Sweden)

    Ioan Alexandru Bubu

    2015-03-01

    Full Text Available Computer software products are among the most complex artifacts, if not the most complex artifacts mankind has created. Securing those artifacts against intelligent attackers who try to exploit flaws in software design and construct is a great challenge too.The purpose of this paper is to introduce a secure alternative to banking software applications that are currently in use. This new application aims to cover most of the well-known vulnerabilities that plague the majority of current software.First we will take a quick look at current security methods that are in use, and a few known vulnerabilities. After this, we will discuss the security measures implemented in my application, and finally, we will the results of implementing them.

  10. Software citation principles

    Directory of Open Access Journals (Sweden)

    Arfon M. Smith

    2016-09-01

    Full Text Available Software is a critical part of modern research and yet there is little support across the scholarly ecosystem for its acknowledgement and citation. Inspired by the activities of the FORCE11 working group focused on data citation, this document summarizes the recommendations of the FORCE11 Software Citation Working Group and its activities between June 2015 and April 2016. Based on a review of existing community practices, the goal of the working group was to produce a consolidated set of citation principles that may encourage broad adoption of a consistent policy for software citation across disciplines and venues. Our work is presented here as a set of software citation principles, a discussion of the motivations for developing the principles, reviews of existing community practice, and a discussion of the requirements these principles would place upon different stakeholders. Working examples and possible technical solutions for how these principles can be implemented will be discussed in a separate paper.

  11. eSoftwareList

    Data.gov (United States)

    US Agency for International Development — USAID Software Database reporting tool created in Oracle Application Express (APEX). This version provides read only access to a database view of the JIRA SAR...

  12. Astronomical Software Directory Service

    Science.gov (United States)

    Hanisch, Robert J.; Payne, Harry; Hayes, Jeffrey

    1997-01-01

    With the support of NASA's Astrophysics Data Program (NRA 92-OSSA-15), we have developed the Astronomical Software Directory Service (ASDS): a distributed, searchable, WWW-based database of software packages and their related documentation. ASDS provides integrated access to 56 astronomical software packages, with more than 16,000 URLs indexed for full-text searching. Users are performing about 400 searches per month. A new aspect of our service is the inclusion of telescope and instrumentation manuals, which prompted us to change the name to the Astronomical Software and Documentation Service. ASDS was originally conceived to serve two purposes: to provide a useful Internet service in an area of expertise of the investigators (astronomical software), and as a research project to investigate various architectures for searching through a set of documents distributed across the Internet. Two of the co-investigators were then installing and maintaining astronomical software as their primary job responsibility. We felt that a service which incorporated our experience in this area would be more useful than a straightforward listing of software packages. The original concept was for a service based on the client/server model, which would function as a directory/referral service rather than as an archive. For performing the searches, we began our investigation with a decision to evaluate the Isite software from the Center for Networked Information Discovery and Retrieval (CNIDR). This software was intended as a replacement for Wide-Area Information Service (WAIS), a client/server technology for performing full-text searches through a set of documents. Isite had some additional features that we considered attractive, and we enjoyed the cooperation of the Isite developers, who were happy to have ASDS as a demonstration project. We ended up staying with the software throughout the project, making modifications to take advantage of new features as they came along, as well as

  13. Global software development

    DEFF Research Database (Denmark)

    Matthiesen, Stina

    2016-01-01

    This overview presents the mid stages of my doctoral research-based on ethnographic work conducted in IT companies in India and in Denmark-on collaborative work within global software development (GSD). In the following I briefly introduce how this research seeks to spark a debate in CSCW...... by challenging contemporary ideals about software development outsourcing through the exploration of the multiplicities and asymmetric dynamics inherent in the collaborative work of GSD....

  14. Biological Imaging Software Tools

    Science.gov (United States)

    Eliceiri, Kevin W.; Berthold, Michael R.; Goldberg, Ilya G.; Ibáñez, Luis; Manjunath, B.S.; Martone, Maryann E.; Murphy, Robert F.; Peng, Hanchuan; Plant, Anne L.; Roysam, Badrinath; Stuurman, Nico; Swedlow, Jason R.; Tomancak, Pavel; Carpenter, Anne E.

    2013-01-01

    Few technologies are more widespread in modern biological laboratories than imaging. Recent advances in optical technologies and instrumentation are providing hitherto unimagined capabilities. Almost all these advances have required the development of software to enable the acquisition, management, analysis, and visualization of the imaging data. We review each computational step that biologists encounter when dealing with digital images, the challenges in that domain, and the overall status of available software for bioimage informatics, focusing on open source options. PMID:22743775

  15. Engineering and Software Engineering

    Science.gov (United States)

    Jackson, Michael

    The phrase ‘software engineering' has many meanings. One central meaning is the reliable development of dependable computer-based systems, especially those for critical applications. This is not a solved problem. Failures in software development have played a large part in many fatalities and in huge economic losses. While some of these failures may be attributable to programming errors in the narrowest sense—a program's failure to satisfy a given formal specification—there is good reason to think that most of them have other roots. These roots are located in the problem of software engineering rather than in the problem of program correctness. The famous 1968 conference was motivated by the belief that software development should be based on “the types of theoretical foundations and practical disciplines that are traditional in the established branches of engineering.” Yet after forty years of currency the phrase ‘software engineering' still denotes no more than a vague and largely unfulfilled aspiration. Two major causes of this disappointment are immediately clear. First, too many areas of software development are inadequately specialised, and consequently have not developed the repertoires of normal designs that are the indispensable basis of reliable engineering success. Second, the relationship between structural design and formal analytical techniques for software has rarely been one of fruitful synergy: too often it has defined a boundary between competing dogmas, at which mutual distrust and incomprehension deprive both sides of advantages that should be within their grasp. This paper discusses these causes and their effects. Whether the common practice of software development will eventually satisfy the broad aspiration of 1968 is hard to predict; but an understanding of past failure is surely a prerequisite of future success.

  16. A Longitudinal Study of Sexual Entitlement and Self-Efficacy among Young Women and Men: Gender Differences and Associations with Age and Sexual Experience

    Science.gov (United States)

    Hewitt-Stubbs, Gillian; Zimmer-Gembeck, Melanie J.; Mastro, Shawna; Boislard, Marie-Aude

    2016-01-01

    Many scholars have called for an increased focus on positive aspects of sexual health and sexuality. Using a longitudinal design with two assessments, we investigated patterns of entitlement to sexual partner pleasure and self-efficacy to achieve sexual pleasure among 295 young men and women aged 17–25 years attending one Australian university. We also tested whether entitlement and efficacy differed by gender, and hypothesized that entitlement and efficacy would be higher in older participants and those with more sexual experience. A sense of entitlement to sexual partner pleasure increased significantly over the year of the study, whereas, on average, there was no change in self-efficacy over time. At Time 1 (T1), young women reported more entitlement than young men. Age was positively associated with T1 entitlement, and experience with a wider range of partnered sexual behaviors was concurrently associated with more entitlement and efficacy and was also associated with increased entitlement to partner pleasure and increased self-efficacy in achieving sexual pleasure at T2 relative to T1. A group with the least amount of sexual experience was particularly low in entitlement and efficacy when compared to groups with a history of coital experience. There was no evidence that any association differed between young men and young women. Limitations of the study include a sample of predominantly middle class, Caucasian students at one university and the possibility that students more interested in sex and relationships, and with more sexual experience, chose to participate. PMID:26797642

  17. Towards research on software cybernetics

    OpenAIRE

    2002-01-01

    Software cybernetics is a newly proposed area in software engineering. It makes better use of the interplay between control theory/engineering and software engineering. In this paper, we look into the research potentials of this emerging area.

  18. Understanding the Tenets of Agile Software Engineering: Lecturing, Exploration and Critical Thinking

    CERN Document Server

    Soundararajan, Shvetha; Chigani, Amine

    2010-01-01

    The use of agile principles and practices in software development is becoming a powerful force in today's workplace. In our quest to develop better products, therefore, it is imperative that we strive to learn and understand the application of Agile methods, principles and techniques to the software development enterprise. Unfortunately, in many educational institutions courses and projects that emphasize Agile Software Development are minimal. At best, students have only limited exposure to the agile philosophy, principles and practices at the graduate and undergraduate levels of education. In an effort to address this concern, we offered a graduate-level course entitled "Agile Software Engineering" in the Department of Computer Science at Virginia Tech in Fall 2009. The primary objectives of the class were to introduce the values, principles and practices underlying the agile philosophy, and to do so in an atmosphere that encourages debate and critical thinking. The course was designed around three central ...

  19. Software Engineering Reviews and Audits

    CERN Document Server

    Summers, Boyd L

    2011-01-01

    Accurate software engineering reviews and audits have become essential to the success of software companies and military and aerospace programs. These reviews and audits define the framework and specific requirements for verifying software development efforts. Authored by an industry professional with three decades of experience, Software Engineering Reviews and Audits offers authoritative guidance for conducting and performing software first article inspections, and functional and physical configuration software audits. It prepares readers to answer common questions for conducting and perform

  20. “I Deserve to Help!” Effects of Entitlement and Social Influence Appeals on Prosocial Motivations

    NARCIS (Netherlands)

    van der Heide, Martje; Fennis, Bob; van Ittersum, Koert; Trampe, Debra; Moreau, Page; Puntoni, Stefano

    2016-01-01

    Entitlement—a sense that one deserves more than others—typically reduces prosocial motivations. We further investigate this relationship by considering the interplay between entitlement and social influence appeals. We demonstrate that a consistency appeal reinforces the negative effect of entitleme

  1. 38 CFR 21.5137 - Benefit payments and charges against entitlement for taking an approved licensing or...

    Science.gov (United States)

    2010-07-01

    ... taking an approved licensing or certification test. (a) Benefit payments. The amount of educational... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Benefit payments and charges against entitlement for taking an approved licensing or certification test. 21.5137 Section...

  2. 49 CFR 512.17 - How long should it take to determine whether information is entitled to confidential treatment?

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 6 2010-10-01 2010-10-01 false How long should it take to determine whether information is entitled to confidential treatment? 512.17 Section 512.17 Transportation Other Regulations... TRANSPORTATION CONFIDENTIAL BUSINESS INFORMATION Agency Determination § 512.17 How long should it take...

  3. The sense of relational entitlement among adolescents toward their parents (SREap) - Testing an adaptation of the SRE.

    Science.gov (United States)

    Tolmacz, Rami; Efrati, Yaniv; Ben-David, Boaz M

    2016-12-01

    The quality of the adolescent-parent relationship is closely related to the adolescent's sense of entitlement. Study 1 (458 central-Israel adolescents, 69% girls, ages: 11-16) developed the sense of relational entitlement among adolescents toward their parents (SREap, adapted from the original SRE on adults' romantic relationships) and provided initial validity evidence of its three-factor structure: exaggerated, restricted and assertive - replicating the SRE's factor structure. Studies 2-5 (1237 adolescents, 56% girls) examined the link between the SREap factors and relevant psychological measures. Exaggerated and restricted SREap factors were associated with attachment insecurities. Restricted and exaggerated entitlement factors were related to higher levels of emotional problems, and lower levels of: wellbeing, positive mood and life satisfaction. Conversely, assertive entitlement was related to higher life satisfaction and self-efficacy and lower levels of emotional problems. The findings also indicate that SREap is not merely a form of narcissism. The implications of SREap are discussed. Copyright © 2016 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  4. 31 CFR 357.10 - Laws governing a Treasury book-entry security, TRADES, and security interests or entitlements.

    Science.gov (United States)

    2010-07-01

    ... DIRECT Treasury/Reserve Automated Debt Entry System (TRADES) § 357.10 Laws governing a Treasury book... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Laws governing a Treasury book-entry security, TRADES, and security interests or entitlements. 357.10 Section 357.10 Money and Finance:...

  5. 20 CFR 404.311 - When does my entitlement to old-age benefits begin and end?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When does my entitlement to old-age benefits...-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Old-Age, Disability, Dependents' and Survivors' Insurance Benefits; Period of Disability Old-Age and Disability Benefits § 404.311 When does my...

  6. 45 CFR 506.18 - Entitlement of survivors to award in case of death of prisoner of war.

    Science.gov (United States)

    2010-10-01

    ... of prisoner of war. 506.18 Section 506.18 Public Welfare Regulations Relating to Public Welfare..., ADMINISTRATION, AND PAYMENT OF CLAIMS UNDER TITLE I OF THE WAR CLAIMS ACT OF 1948, AS AMENDED ELIGIBILITY REQUIREMENTS FOR COMPENSATION Prisoners of War § 506.18 Entitlement of survivors to award in case of death of...

  7. Computing and software

    Directory of Open Access Journals (Sweden)

    White, G. C.

    2004-06-01

    Full Text Available The reality is that the statistical methods used for analysis of data depend upon the availability of software. Analysis of marked animal data is no different than the rest of the statistical field. The methods used for analysis are those that are available in reliable software packages. Thus, the critical importance of having reliable, up–to–date software available to biologists is obvious. Statisticians have continued to develop more robust models, ever expanding the suite of potential analysis methods available. But without software to implement these newer methods, they will languish in the abstract, and not be applied to the problems deserving them. In the Computers and Software Session, two new software packages are described, a comparison of implementation of methods for the estimation of nest survival is provided, and a more speculative paper about how the next generation of software might be structured is presented. Rotella et al. (2004 compare nest survival estimation with different software packages: SAS logistic regression, SAS non–linear mixed models, and Program MARK. Nests are assumed to be visited at various, possibly infrequent, intervals. All of the approaches described compute nest survival with the same likelihood, and require that the age of the nest is known to account for nests that eventually hatch. However, each approach offers advantages and disadvantages, explored by Rotella et al. (2004. Efford et al. (2004 present a new software package called DENSITY. The package computes population abundance and density from trapping arrays and other detection methods with a new and unique approach. DENSITY represents the first major addition to the analysis of trapping arrays in 20 years. Barker & White (2004 discuss how existing software such as Program MARK require that each new model’s likelihood must be programmed specifically for that model. They wishfully think that future software might allow the user to combine

  8. "Liberalizing" the English National Health Service: background and risks to healthcare entitlement.

    Science.gov (United States)

    Filippon, Jonathan; Giovanella, Ligia; Konder, Mariana; Pollock, Allyson M

    2016-08-29

    The recent reform of the English National Health Service (NHS) through the Health and Social Care Act of 2012 introduced important changes in the organization, management, and provision of public health services in England. This study aims to analyze the NHS reforms in the historical context of predominance of neoliberal theories since 1980 and to discuss the "liberalization" of the NHS. The study identifies and analyzes three phases: (i) gradual ideological and theoretical substitution (1979-1990) - transition from professional and health logic to management and commercial logic; (ii) bureaucracy and incipient market (1991-2004) - structuring of the bureaucracy focused on administration of the internal market and expansion of pro-market measures; and (iii) opening to the market, fragmentation, and discontinuity of services (2005-2012) - weakening of the territorial health model and consolidation of health as an open market for public and private providers. This gradual but constant liberalization has closed services and restricted access, jeopardizing the system's comprehensiveness, equity, and universal healthcare entitlement in the NHS.

  9. Between welfare medicine and mainstream entitlement: Medicaid at the political crossroads.

    Science.gov (United States)

    Grogan, Colleen; Patashnik, Eric

    2003-10-01

    As the new century begins, the Medicaid program is arguably at a political crossroads. Over the 1980s and 1990s, policy makers enacted major expansions in Medicaid coverage, offering significant new health benefits to poor women and children and other constituencies. In elite rhetoric and political framing, Medicaid was increasingly cast as a broad-based social welfare entitlement of value to all Americans, including middle-class citizens. Some health care advocates began viewing Medicaid expansions as a potential path to achieving universal coverage in the United States. Yet Medicaid remains a means-tested program that has been repeatedly threatened with policy retrenchment. In this essay, we scrutinize Medicaid's current status and future possibilities from a historical-institutional perspective by tracing its complex evolution since its enactment in the Social Security Amendments of 1965. Our core claim is that decisions made at the time of Medicaid's original adoption have fundamentally set the matrix for struggles over the program's unfolding development. We demonstrate that key ambiguities embedded in the 1965 act created largely unintended opportunities for policy entrepreneurs to broaden Medicaid's scale and scope as well as foreseeable vulnerabilities that must be overcome if Medicaid is to realize its full potential.

  10. Managing Distributed Software Projects

    DEFF Research Database (Denmark)

    Persson, John Stouby

    Increasingly, software projects are becoming geographically distributed, with limited face-toface interaction between participants. These projects face particular challenges that need careful managerial attention. This PhD study reports on how we can understand and support the management of distr......Increasingly, software projects are becoming geographically distributed, with limited face-toface interaction between participants. These projects face particular challenges that need careful managerial attention. This PhD study reports on how we can understand and support the management...... of distributed software projects, based on a literature study and a case study. The main emphasis of the literature study was on how to support the management of distributed software projects, but also contributed to an understanding of these projects. The main emphasis of the case study was on how to understand...... the management of distributed software projects, but also contributed to supporting the management of these projects. The literature study integrates what we know about risks and risk-resolution techniques, into a framework for managing risks in distributed contexts. This framework was developed iteratively...

  11. The Ettention software package

    Energy Technology Data Exchange (ETDEWEB)

    Dahmen, Tim, E-mail: Tim.Dahmen@dfki.de [German Research Center for Artificial Intelligence GmbH (DFKI), 66123 Saarbrücken (Germany); Saarland University, 66123 Saarbrücken (Germany); Marsalek, Lukas [Eyen SE, Na Nivách 1043/16, 141 00 Praha 4 (Czech Republic); Saarland University, 66123 Saarbrücken (Germany); Marniok, Nico [Saarland University, 66123 Saarbrücken (Germany); Turoňová, Beata [Saarland University, 66123 Saarbrücken (Germany); IMPRS-CS, Max-Planck Institute for Informatics, Campus E 1.4, 66123 Saarbrücken (Germany); Bogachev, Sviatoslav [Saarland University, 66123 Saarbrücken (Germany); Trampert, Patrick; Nickels, Stefan [German Research Center for Artificial Intelligence GmbH (DFKI), 66123 Saarbrücken (Germany); Slusallek, Philipp [German Research Center for Artificial Intelligence GmbH (DFKI), 66123 Saarbrücken (Germany); Saarland University, 66123 Saarbrücken (Germany)

    2016-02-15

    We present a novel software package for the problem “reconstruction from projections” in electron microscopy. The Ettention framework consists of a set of modular building-blocks for tomographic reconstruction algorithms. The well-known block iterative reconstruction method based on Kaczmarz algorithm is implemented using these building-blocks, including adaptations specific to electron tomography. Ettention simultaneously features (1) a modular, object-oriented software design, (2) optimized access to high-performance computing (HPC) platforms such as graphic processing units (GPU) or many-core architectures like Xeon Phi, and (3) accessibility to microscopy end-users via integration in the IMOD package and eTomo user interface. We also provide developers with a clean and well-structured application programming interface (API) that allows for extending the software easily and thus makes it an ideal platform for algorithmic research while hiding most of the technical details of high-performance computing. - Highlights: • Novel software package for “reconstruction from projections” in electron microscopy. • Support for high-resolution reconstructions on iterative reconstruction algorithms. • Support for CPU, GPU and Xeon Phi. • Integration in the IMOD software. • Platform for algorithm researchers: object oriented, modular design.

  12. Software Activation Using Multithreading

    Directory of Open Access Journals (Sweden)

    Jianrui Zhang

    2012-11-01

    Full Text Available Software activation is an anti-piracy technology designed to verify that software products have been legitimately licensed. Activation should be quick and simple while simultaneously being secure and protecting customer privacy. The most common form of software activation is for the user to enter a legitimate product serial number. However, software activation based on serial numbers appears to be weak, since cracks for many programs are readily available on the Internet. Users can employ such cracks to bypass software activation.Serial number verification logic usually executes sequentially in a single thread. Such an approach is relatively easy to break since attackers can trace the code to understand how the logic works. In this paper, we develop a practical multi-threaded verification design. Our results show that by proper use of multi-threading, the amount of traceable code in a debugger can be reduced to a low percentage of the total and the traceable code in each run can differ as well. This makes it significantly more difficult for an attacker to reverse engineer the code as a means of bypassing a security check. Finally, we attempt to quantify the increased effort needed to break our verification logic.

  13. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 15

    Science.gov (United States)

    1997-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  14. Impact of Agile Software Development Model on Software Maintainability

    Science.gov (United States)

    Gawali, Ajay R.

    2012-01-01

    Software maintenance and support costs account for up to 60% of the overall software life cycle cost and often burdens tightly budgeted information technology (IT) organizations. Agile software development approach delivers business value early, but implications on software maintainability are still unknown. The purpose of this quantitative study…

  15. Software cost/resource modeling: Software quality tradeoff measurement

    Science.gov (United States)

    Lawler, R. W.

    1980-01-01

    A conceptual framework for treating software quality from a total system perspective is developed. Examples are given to show how system quality objectives may be allocated to hardware and software; to illustrate trades among quality factors, both hardware and software, to achieve system performance objectives; and to illustrate the impact of certain design choices on software functionality.

  16. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 13

    Science.gov (United States)

    1995-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  17. Software Engineering Laboratory Series: Collected Software Engineering Papers. Volume 14

    Science.gov (United States)

    1996-01-01

    The Software Engineering Laboratory (SEL) is an organization sponsored by NASA/GSFC and created to investigate the effectiveness of software engineering technologies when applied to the development of application software. The activities, findings, and recommendations of the SEL are recorded in the Software Engineering Laboratory Series, a continuing series of reports that includes this document.

  18. Impact of Agile Software Development Model on Software Maintainability

    Science.gov (United States)

    Gawali, Ajay R.

    2012-01-01

    Software maintenance and support costs account for up to 60% of the overall software life cycle cost and often burdens tightly budgeted information technology (IT) organizations. Agile software development approach delivers business value early, but implications on software maintainability are still unknown. The purpose of this quantitative study…

  19. libdrdc: software standards library

    Science.gov (United States)

    Erickson, David; Peng, Tie

    2008-04-01

    This paper presents the libdrdc software standards library including internal nomenclature, definitions, units of measure, coordinate reference frames, and representations for use in autonomous systems research. This library is a configurable, portable C-function wrapped C++ / Object Oriented C library developed to be independent of software middleware, system architecture, processor, or operating system. It is designed to use the automatically-tuned linear algebra suite (ATLAS) and Basic Linear Algebra Suite (BLAS) and port to firmware and software. The library goal is to unify data collection and representation for various microcontrollers and Central Processing Unit (CPU) cores and to provide a common Application Binary Interface (ABI) for research projects at all scales. The library supports multi-platform development and currently works on Windows, Unix, GNU/Linux, and Real-Time Executive for Multiprocessor Systems (RTEMS). This library is made available under LGPL version 2.1 license.

  20. Lecture 2: Software Security

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  1. Astronomers as Software Developers

    Science.gov (United States)

    Pildis, Rachel A.

    2016-01-01

    Astronomers know that their research requires writing, adapting, and documenting computer software. Furthermore, they often have to learn new computer languages and figure out how existing programs work without much documentation or guidance and with extreme time pressure. These are all skills that can lead to a software development job, but recruiters and employers probably won't know that. I will discuss all the highly useful experience that astronomers may not know that they already have, and how to explain that knowledge to others when looking for non-academic software positions. I will also talk about some of the pitfalls I have run into while interviewing for jobs and working as a developer, and encourage you to embrace the curiosity employers might have about your non-standard background.

  2. Secure software practices among Malaysian software practitioners: An exploratory study

    Science.gov (United States)

    Mohamed, Shafinah Farvin Packeer; Baharom, Fauziah; Deraman, Aziz; Yahya, Jamaiah; Mohd, Haslina

    2016-08-01

    Secure software practices is increasingly gaining much importance among software practitioners and researchers due to the rise of computer crimes in the software industry. It has become as one of the determinant factors for producing high quality software. Even though its importance has been revealed, its current practice in the software industry is still scarce, particularly in Malaysia. Thus, an exploratory study is conducted among software practitioners in Malaysia to study their experiences and practices in the real-world projects. This paper discusses the findings from the study, which involved 93 software practitioners. Structured questionnaire is utilized for data collection purpose whilst statistical methods such as frequency, mean, and cross tabulation are used for data analysis. Outcomes from this study reveal that software practitioners are becoming increasingly aware on the importance of secure software practices, however, they lack of appropriate implementation, which could affect the quality of produced software.

  3. Methods of Software Verification

    Directory of Open Access Journals (Sweden)

    R. E. Gurin

    2015-01-01

    Full Text Available This article is devoted to the problem of software verification (SW. Methods of software verification designed to check the software for compliance with the stated requirements such as correctness, system security and system adaptability to small changes in the environment, portability and compatibility, etc. These are various methods both by the operation process and by the way of achieving result. The article describes the static and dynamic methods of software verification and paid attention to the method of symbolic execution. In its review of static analysis are discussed and described the deductive method, and methods for testing the model. A relevant issue of the pros and cons of a particular method is emphasized. The article considers classification of test techniques for each method. In this paper we present and analyze the characteristics and mechanisms of the static analysis of dependencies, as well as their views, which can reduce the number of false positives in situations where the current state of the program combines two or more states obtained both in different paths of execution and in working with multiple object values. Dependences connect various types of software objects: single variables, the elements of composite variables (structure fields, array elements, the size of the heap areas, the length of lines, the number of initialized array elements in the verification code using static methods. The article pays attention to the identification of dependencies within the framework of the abstract interpretation, as well as gives an overview and analysis of the inference tools.Methods of dynamic analysis such as testing, monitoring and profiling are presented and analyzed. Also some kinds of tools are considered which can be applied to the software when using the methods of dynamic analysis. Based on the work a conclusion is drawn, which describes the most relevant problems of analysis techniques, methods of their solutions and

  4. Processeringsoptimering med Canons software

    DEFF Research Database (Denmark)

    Precht, Helle

    2009-01-01

    . Muligheder i software optimering blev studeret i relation til optimal billedkvalitet og kontrol optagelser, for at undersøge om det var muligt at acceptere diagnostisk billedkvalitet og derved tage afsæt i ALARA. Metode og materialer Et kvantitativt eksperimentelt studie baseret på forsøg med teknisk og...... humant fantom. CD Rad fantom anvendes som teknisk fantom, hvor billederne blev analyseret med CD Rad software, og resultatet var en objektiv IQF værdi. Det humane fantom var et lamme pelvis med femur, der via NRPB’ er sammenlignelig med absorptionen ved et femårigt barn. De humane forsøgsbilleder blev...

  5. Agile distributed software development

    DEFF Research Database (Denmark)

    Persson, John Stouby; Mathiassen, Lars; Aaen, Ivan

    2012-01-01

    While face-to-face interaction is fundamental in agile software development, distributed environments must rely extensively on mediated interactions. Practicing agile principles in distributed environments therefore poses particular control challenges related to balancing fixed vs. evolving quality...... requirements and people vs. process-based collaboration. To investigate these challenges, we conducted an in-depth case study of a successful agile distributed software project with participants from a Russian firm and a Danish firm. Applying Kirsch’s elements of control framework, we offer an analysis of how...

  6. Software Testing as Science

    Directory of Open Access Journals (Sweden)

    Ingrid Gallesdic

    2013-06-01

    Full Text Available The most widespread opinion among people who have some connection with software testing is that this activity is an art. In fact, books have been published widely whose titles refer to it as art, role or process. But because software complexity is increasing every year, this paper proposes a new approach, conceiving the test as a science. This is because the processes by which they are applied are the steps of the scientific method: inputs, processes, outputs. The contents of this paper examines the similarities and test characteristics as science.

  7. Agile software development

    CERN Document Server

    Stober, Thomas

    2009-01-01

    Software Development is moving towards a more agile and more flexible approach. It turns out that the traditional 'waterfall' model is not supportive in an environment where technical, financial and strategic constraints are changing almost every day. But what is agility? What are today's major approaches? And especially: What is the impact of agile development principles on the development teams, on project management and on software architects? How can large enterprises become more agile and improve their business processes, which have been existing since many, many years? What are the limit

  8. Software Safety and Security

    CERN Document Server

    Nipkow, T; Hauptmann, B

    2012-01-01

    Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was

  9. Machine Tool Software

    Science.gov (United States)

    1988-01-01

    A NASA-developed software package has played a part in technical education of students who major in Mechanical Engineering Technology at William Rainey Harper College. Professor Hack has been using (APT) Automatically Programmed Tool Software since 1969 in his CAD/CAM Computer Aided Design and Manufacturing curriculum. Professor Hack teaches the use of APT programming languages for control of metal cutting machines. Machine tool instructions are geometry definitions written in APT Language to constitute a "part program." The part program is processed by the machine tool. CAD/CAM students go from writing a program to cutting steel in the course of a semester.

  10. Software product quality control

    CERN Document Server

    Wagner, Stefan

    2013-01-01

    Quality is not a fixed or universal property of software; it depends on the context and goals of its stakeholders. Hence, when you want to develop a high-quality software system, the first step must be a clear and precise specification of quality. Yet even if you get it right and complete, you can be sure that it will become invalid over time. So the only solution is continuous quality control: the steady and explicit evaluation of a product's properties with respect to its updated quality goals.This book guides you in setting up and running continuous quality control in your environment. Star

  11. TIA Software User's Manual

    Science.gov (United States)

    Cramer, K. Elliott; Syed, Hazari I.

    1995-01-01

    This user's manual describes the installation and operation of TIA, the Thermal-Imaging acquisition and processing Application, developed by the Nondestructive Evaluation Sciences Branch at NASA Langley Research Center, Hampton, Virginia. TIA is a user friendly graphical interface application for the Macintosh 2 and higher series computers. The software has been developed to interface with the Perceptics/Westinghouse Pixelpipe(TM) and PixelStore(TM) NuBus cards and the GW Instruments MacADIOS(TM) input-output (I/O) card for the Macintosh for imaging thermal data. The software is also capable of performing generic image-processing functions.

  12. Workstation software framework

    Science.gov (United States)

    Andolfato, L.; Karban, R.

    2008-08-01

    The Workstation Software Framework (WSF) is a state machine model driven development toolkit designed to generate event driven applications based on ESO VLT software. State machine models are used to generate executables. The toolkit provides versatile code generation options and it supports Mealy, Moore and hierarchical state machines. Generated code is readable and maintainable since it combines well known design patterns such as the State and the Template patterns. WSF promotes a development process that is based on model reusability through the creation of a catalog of state machine patterns.

  13. Green in software engineering

    CERN Document Server

    Calero Munoz, Coral

    2015-01-01

    This is the first book that presents a comprehensive overview of sustainability aspects in software engineering. Its format follows the structure of the SWEBOK and covers the key areas involved in the incorporation of green aspects in software engineering, encompassing topics from requirement elicitation to quality assurance and maintenance, while also considering professional practices and economic aspects. The book consists of thirteen chapters, which are structured in five parts. First the "Introduction" gives an overview of the primary general concepts related to Green IT, discussing wha

  14. Six Sigma software development

    CERN Document Server

    Tayntor, Christine B

    2002-01-01

    Since Six Sigma has had marked success in improving quality in other settings, and since the quality of software remains poor, it seems a natural evolution to apply the concepts and tools of Six Sigma to system development and the IT department. Until now however, there were no books available that applied these concepts to the system development process. Six Sigma Software Development fills this void and illustrates how Six Sigma concepts can be applied to all aspects of the evolving system development process. It includes the traditional waterfall model and in the support of legacy systems,

  15. INTEGRATING CRM SOFTWARE APPLICATIONS

    OpenAIRE

    2008-01-01

    Scientists, end users of CRM applications and producers of CRM software, all come to an agreement when talking about the idea of CRM, the CRM strategy or the term CRM. The main aspect is that CRM can be analyzed from two different points of view: CRM – the marketing strategy and CRM – the software. The first term refers to establishing some personalized relationships with the customers that can be afterwards easily managed. This way, it can determine at any time the past client relations, the...

  16. Future Trends of Software Technology and Applications: Software Architecture

    Science.gov (United States)

    2006-01-01

    Sponsored by the U.S. Department of Defense © 2006 by Carnegie Mellon University 1 Pittsburgh, PA 15213-3890 Future Trends of Software Technology ...COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Future Trends of Software Technology and Applications: Software Architecture 5a. CONTRACT...and Applications: Software Architecture Paul Clements Software Engineering Institute Carnegie Mellon University Report Documentation Page Form

  17. Rugby league injuries in New Zealand: a review of 8 years of Accident Compensation Corporation injury entitlement claims and costs.

    Science.gov (United States)

    King, D A; Hume, P A; Milburn, P; Gianotti, S

    2009-08-01

    This paper provides an overview of the epidemiology of rugby league injuries and associated costs in New Zealand requiring medical treatment. New Zealand national Accident Compensation Corporation injury data for the period 1999 to 2007 were searched for rugby league injury cases. Data were analysed by demographics, body region, nature/severity of injury, and medical procedure and costs. A total of 5941 injury entitlement claims were recorded over the study period with a significant decrease observed in the injury rate between the 1999-2000 and 2002-2003 reporting years. The total cost of the injuries for the study period was $42,822,048 (equivalent to pound15,916,072). The mean (SD) number of injury entitlement claims per year was 743 (271) and yearly cost was $5,352,760 (pound1,989,880) ($2,485,535 (pound923,994)). The knee was the most commonly reported injury site (225 per 1000 entitlement claims; $8,750,147 (pound3,252,020)) and soft tissue injuries were the most common injury types (474 per 1000 entitlement claims; $17,324,214 (pound6,438,599)). Accounting for only 1.8% of total injury entitlement claims, concussion/brain injuries accounted for 6.3% of injury entitlement costs and had the highest mean cost per claim ($25 347 (pound9420)). The upper and lower arm recorded the highest mean injury site claim cost of $43,096 (pound16,016) per claim. The 25-29 age group recorded 27.7% of total injury entitlement claims and 29.6% of total injury entitlement costs, which was slightly more than the 20-24 age group (27.3% claims; 24.7% costs). Nearly 15% of total moderate to serious injury entitlement claims and 20% of total costs were recorded from participants 35 years or older. This study identified that the knee was the most common injury site and soft tissue injuries were the most common injury type requiring medical treatment, which is consistent with other international studies on rugby league epidemiology. This study also highlights that the rate of injury and

  18. College instruction is not so stress free after all: A qualitative and quantitative study of academic entitlement, uncivil behaviors, and instructor strain and burnout.

    Science.gov (United States)

    Jiang, Lixin; Tripp, Thomas M; Hong, Phan Y

    2017-01-19

    The vast majority of today's college students are millennials, who have traits of confidence, tolerance, but also of entitlement and narcissism (Twenge, 2006). Therefore, college instructors face a unique challenge: dealing with the requests from academically entitled students, who have unreasonable expectations of receiving academic success, regardless of performance (Chowning & Campbell, 2009). We conducted two studies to examine whether student academic entitlement would increase instructors' strain and burnout via uncivil behaviors. A qualitative inquiry asked 136 instructors with college-teaching experience to describe types of behaviors entitled students display, their responses to entitled students, and the influence of these interactions on instructors' well-being. Next, a quantitative study with data from 857 college students nested in 34 instructors tested a multilevel mediation model where students' academic entitlement was related to instructor-reported uncivil behaviors, which in turn related to instructors' strain and burnout. Both studies largely support our hypothesis that uncivil behaviors fully mediate the relationship between students' academic entitlement and instructors' strain and burnout. We recommend employing behavioral modification strategies to decrease uncivil behaviors (e.g., class rules regarding uncivil behaviors might be specified in the course syllabus and consistently enforced) because academic entitlement attitudes are largely stable beliefs and thus may be less amenable to modification.

  19. 20 CFR 1002.150 - Which non-seniority rights and benefits is the employee entitled to during a period of service?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Which non-seniority rights and benefits is... Absence § 1002.150 Which non-seniority rights and benefits is the employee entitled to during a period of service? (a) The non-seniority rights and benefits to which an employee is entitled during a period...

  20. Software testing concepts and operations

    CERN Document Server

    Mili, Ali

    2015-01-01

    Explores and identifies the main issues, concepts, principles and evolution of software testing, including software quality engineering and testing concepts, test data generation, test deployment analysis, and software test managementThis book examines the principles, concepts, and processes that are fundamental to the software testing function. This book is divided into five broad parts. Part I introduces software testing in the broader context of software engineering and explores the qualities that testing aims to achieve or ascertain, as well as the lifecycle of software testing. Part II c

  1. The Art of Software Testing

    CERN Document Server

    Myers, Glenford J; Badgett, Tom

    2011-01-01

    The classic, landmark work on software testing The hardware and software of computing have changed markedly in the three decades since the first edition of The Art of Software Testing, but this book's powerful underlying analysis has stood the test of time. Whereas most books on software testing target particular development techniques, languages, or testing methods, The Art of Software Testing, Third Edition provides a brief but powerful and comprehensive presentation of time-proven software testing approaches. If your software development project is mission critical, this book is an investme

  2. Evaluation & Optimization of Software Engineering

    Directory of Open Access Journals (Sweden)

    Asaduzzaman Noman

    2016-06-01

    Full Text Available The term is made of two words, software and engineering. Software is more than just a program code. A program is an executable code, which serves some computational purpose. Software is considered to be collection of executable programming code, associated libraries and documentations. Software, when made for a specific requirement is called software product. Engineering on the other hand, is all about developing products, using well-defined, scientific principles and methods. The outcome of software engineering is an efficient and reliable software product. IEEE defines software engineering as: The application of a systematic, disciplined, quantifiable approach to the development, operation and maintenance of software; that is, the application of engineering to software.

  3. The software analysis project for the Office of Human Resources

    Science.gov (United States)

    Tureman, Robert L., Jr.

    1994-01-01

    There were two major sections of the project for the Office of Human Resources (OHR). The first section was to conduct a planning study to analyze software use with the goal of recommending software purchases and determining whether the need exists for a file server. The second section was analysis and distribution planning for retirement planning computer program entitled VISION provided by NASA Headquarters. The software planning study was developed to help OHR analyze the current administrative desktop computing environment and make decisions regarding software acquisition and implementation. There were three major areas addressed by the study: current environment new software requirements, and strategies regarding the implementation of a server in the Office. To gather data on current environment, employees were surveyed and an inventory of computers were produced. The surveys were compiled and analyzed by the ASEE fellow with interpretation help by OHR staff. New software requirements represented a compilation and analysis of the surveyed requests of OHR personnel. Finally, the information on the use of a server represents research done by the ASEE fellow and analysis of survey data to determine software requirements for a server. This included selection of a methodology to estimate the number of copies of each software program required given current use and estimated growth. The report presents the results of the computing survey, a description of the current computing environment, recommenations for changes in the computing environment, current software needs, management advantages of using a server, and management considerations in the implementation of a server. In addition, detailed specifications were presented for the hardware and software recommendations to offer a complete picture to OHR management. The retirement planning computer program available to NASA employees will aid in long-range retirement planning. The intended audience is the NASA civil

  4. Software for multistate analysis

    Directory of Open Access Journals (Sweden)

    Frans J. Willekens

    2014-08-01

    Full Text Available Background: The growing interest in pathways, the increased availability of life-history data,innovations in statistical and demographic techniques, and advances in softwaretechnology have stimulated the development of software packages for multistatemodeling of life histories. Objective: In the paper we list and briefly discuss several software packages for multistate analysisof life-history data. The packages cover the estimation of multistate models (transitionrates and transition probabilities, multistate life tables, multistate populationprojections, and microsimulation. Methods: Brief description of software packages in a historical and comparative perspective. Results: During the past 10 years the advances in multistate modeling software have beenimpressive. New computational tools accompany the development of new methods instatistics and demography. The statistical theory of counting processes is the preferredmethod for the estimation of multistate models and R is the preferred programmingplatform. Conclusions: Innovations in method, data, and computer technology have removed the traditionalbarriers to multistate modeling of life histories and the computation of informative lifecourseindicators. The challenge ahead of us is to model and predict individual lifehistories.

  5. Open Source Software Acquisition

    DEFF Research Database (Denmark)

    Holck, Jesper; Kühn Pedersen, Mogens; Holm Larsen, Michael

    2005-01-01

    Lately we have seen a growing interest from both public and private organisations to adopt OpenSource Software (OSS), not only for a few, specific applications but also on a more general levelthroughout the organisation. As a consequence, the organisations' decisions on adoption of OSS arebecoming...

  6. Software Process Improvement

    DEFF Research Database (Denmark)

    Kuhrmann, Marco; Diebold, Philipp; Münch, Jürgen

    2016-01-01

    Software process improvement (SPI) is around for decades: frameworks are proposed, success factors are studied, and experiences have been reported. However, the sheer mass of concepts, approaches, and standards published over the years overwhelms practitioners as well as researchers. What is out...

  7. Global Software Development

    DEFF Research Database (Denmark)

    Søderberg, Anne-Marie; Krishna, S.; Bjørn, Pernille

    2013-01-01

    accounts of close collaboration processes in two large and complex projects, where off-shoring of software development is moved to a strategic level, we found that the vendor was able to establish a strategic partnership through long-term engagement with the field of banking and insurance as well...

  8. Improving Agile Software Practice

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte

    2006-01-01

    Software process improvement in small and agile organizations is often problematic, but achieving good SPI-assessments can still be necessary to stay in the marked or to meet demands of multinational owners. The traditional norm driven, centralized and control centered improvement approaches has...

  9. AOFlagger: RFI Software

    Science.gov (United States)

    Offringa, A. R.

    2010-10-01

    The RFI software presented here can automatically flag data and can be used to analyze the data in a measurement. The purpose of flagging is to mark samples that are affected by interfering sources such as radio stations, airplanes, electrical fences or other transmitting interferers. The tools in the package are meant for offline use. The software package contains a graphical interface ("rfigui") that can be used to visualize a measurement set and analyze mitigation techniques. It also contains a console flagger ("rficonsole") that can execute a script of mitigation functions without the overhead of a graphical environment. All tools were written in C++. The software has been tested extensively on low radio frequencies (150 MHz or lower) produced by the WSRT and LOFAR telescopes. LOFAR is the Low Frequency Array that is built in and around the Netherlands. Higher frequencies should work as well. Some of the methods implemented are the SumThreshold, the VarThreshold and the singular value decomposition (SVD) method. Included also are several surface fitting algorithms. The software is published under the GNU General Public License version 3.

  10. Writing testable software requirements

    Energy Technology Data Exchange (ETDEWEB)

    Knirk, D. [Sandia National Labs., Albuquerque, NM (United States)

    1997-11-01

    This tutorial identifies common problems in analyzing requirements in the problem and constructing a written specification of what the software is to do. It deals with two main problem areas: identifying and describing problem requirements, and analyzing and describing behavior specifications.

  11. Improving Agile Software Practice

    DEFF Research Database (Denmark)

    Tjørnehøj, Gitte

    2006-01-01

    Software process improvement in small and agile organizations is often problematic, but achieving good SPI-assessments can still be necessary to stay in the marked or to meet demands of multinational owners. The traditional norm driven, centralized and control centered improvement approaches has...

  12. Software Process Improvement

    DEFF Research Database (Denmark)

    Kuhrmann, Marco; Konopka, Claudia; Nellemann, Peter

    2016-01-01

    Software process improvement (SPI) is around for decades: frameworks are proposed, success factors are studied, and experiences have been reported. However, the sheer mass of concepts, approaches, and standards published over the years overwhelms practitioners as well as researchers. What is out...

  13. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...

  14. Complexity, Systems, and Software

    Science.gov (United States)

    2014-08-14

    complex ( Hidden issues; dumbs down operator) 11 Complexity, Systems, and Software Sarah Sheard August 14, 2014 © 2014 Carnegie...August 14, 2014 © 2014 Carnegie Mellon University Addressing Complexity in SoSs Source: SEBOK Wiki System Con truer Strateglc Context

  15. Green Software Products

    NARCIS (Netherlands)

    Jagroep, Erik Arijender

    2017-01-01

    The rising energy consumption of the ICT industry has triggered a quest for more green, energy efficient ICT solutions. The role of software as the true consumer of power and its potential contribution to reach sustainability goals has increasingly been acknowledged. At the same time, it is shown to

  16. The FARE Software

    Science.gov (United States)

    Pitarello, Adriana

    2015-01-01

    This article highlights the importance of immediate corrective feedback in tutorial software for language teaching in an academic learning environment. We aim to demonstrate that, rather than simply reporting on the performance of the foreign language learner, this feedback can act as a mediator of students' cognitive and metacognitive activity.…

  17. JSATS Decoder Software Manual

    Energy Technology Data Exchange (ETDEWEB)

    Flory, Adam E.; Lamarche, Brian L.; Weiland, Mark A.

    2013-05-01

    The Juvenile Salmon Acoustic Telemetry System (JSATS) Decoder is a software application that converts a digitized acoustic signal (a waveform stored in the .bwm file format) into a list of potential JSATS Acoustic MicroTransmitter (AMT) tagcodes along with other data about the signal including time of arrival and signal to noise ratios (SNR). This software is capable of decoding single files, directories, and viewing raw acoustic waveforms. When coupled with the JSATS Detector, the Decoder is capable of decoding in ‘real-time’ and can also provide statistical information about acoustic beacons placed within receive range of hydrophones within a JSATS array. This document details the features and functionality of the software. The document begins with software installation instructions (section 2), followed in order by instructions for decoder setup (section 3), decoding process initiation (section 4), then monitoring of beacons (section 5) using real-time decoding features. The last section in the manual describes the beacon, beacon statistics, and the results file formats. This document does not consider the raw binary waveform file format.

  18. Software Architecture Evolution

    Science.gov (United States)

    2013-12-01

    Clinical Linguistics & Phonetics 16(5): 299–316. doi:10.1080/ 02699200210135901 [162] G. C. Murphy, D. Notkin, K. J. Sullivan (2001). “Software...same connector in the model. One way of understanding such examples is as instances of a very common linguistic phenomenon called synecdoche, in which a

  19. High Assurance Software

    Science.gov (United States)

    2013-10-22

    Conference on Software Engineering. 2013. Fingerprinting Malware Using Bioinformatics Tools Building a Classifier for the Zeus Virus, Pedersen, J...file is a nucleotide representation of the original artifact file. This process can be reversed to obtain the original file from the FASTA file

  20. Limits of Software Reuse

    NARCIS (Netherlands)

    Holenderski, L.

    2006-01-01

    Software reuse is considered one of the main techniques to increasesoftware productivity. We present two simple mathematical argumentsthat show some theoretical limits of reuse. It turns out that the increase of productivity due to internal reuse is at most linear, farfrom the needed exponential gr

  1. Software engineering tools.

    Science.gov (United States)

    Wear, L L; Pinkert, J R

    1994-01-01

    We have looked at general descriptions and illustrations of several software development tools, such as tools for prototyping, developing DFDs, testing, and maintenance. Many others are available, and new ones are being developed. However, you have at least seen some examples of powerful CASE tools for systems development.

  2. Generalized Software Security Framework

    Directory of Open Access Journals (Sweden)

    Smriti Jain

    2011-01-01

    Full Text Available Security of information has become a major concern in today's digitized world. As a result, effective techniques to secure information are required. The most effective way is to incorporate security in the development process itself thereby resulting into secured product. In this paper, we propose a framework that enables security to be included in the software development process. The framework consists of three layers namely; control layer, aspect layer and development layer. The control layer illustrates the managerial control of the entire software development process with the help of governance whereas aspect layer recognizes the security mechanisms that can be incorporated during the software development to identify the various security features. The development layer helps to integrate the various security aspects as well as the controls identified in the above layers during the development process. The layers are further verified by a survey amongst the IT professionals. The professionals concluded that the developed framework is easy to use due to its layered architecture and, can be customized for various types of softwares.

  3. Iterative software kernels

    Energy Technology Data Exchange (ETDEWEB)

    Duff, I.

    1994-12-31

    This workshop focuses on kernels for iterative software packages. Specifically, the three speakers discuss various aspects of sparse BLAS kernels. Their topics are: `Current status of user lever sparse BLAS`; Current status of the sparse BLAS toolkit`; and `Adding matrix-matrix and matrix-matrix-matrix multiply to the sparse BLAS toolkit`.

  4. Generic Kalman Filter Software

    Science.gov (United States)

    Lisano, Michael E., II; Crues, Edwin Z.

    2005-01-01

    The Generic Kalman Filter (GKF) software provides a standard basis for the development of application-specific Kalman-filter programs. Historically, Kalman filters have been implemented by customized programs that must be written, coded, and debugged anew for each unique application, then tested and tuned with simulated or actual measurement data. Total development times for typical Kalman-filter application programs have ranged from months to weeks. The GKF software can simplify the development process and reduce the development time by eliminating the need to re-create the fundamental implementation of the Kalman filter for each new application. The GKF software is written in the ANSI C programming language. It contains a generic Kalman-filter-development directory that, in turn, contains a code for a generic Kalman filter function; more specifically, it contains a generically designed and generically coded implementation of linear, linearized, and extended Kalman filtering algorithms, including algorithms for state- and covariance-update and -propagation functions. The mathematical theory that underlies the algorithms is well known and has been reported extensively in the open technical literature. Also contained in the directory are a header file that defines generic Kalman-filter data structures and prototype functions and template versions of application-specific subfunction and calling navigation/estimation routine code and headers. Once the user has provided a calling routine and the required application-specific subfunctions, the application-specific Kalman-filter software can be compiled and executed immediately. During execution, the generic Kalman-filter function is called from a higher-level navigation or estimation routine that preprocesses measurement data and post-processes output data. The generic Kalman-filter function uses the aforementioned data structures and five implementation- specific subfunctions, which have been developed by the user on

  5. Software redundancy: what, where, how

    OpenAIRE

    Mattavelli, Andrea; Pezzè, Mauro; Carzaniga, Antonio

    2017-01-01

    Software systems have become pervasive in everyday life and are the core component of many crucial activities. An inadequate level of reliability may determine the commercial failure of a software product. Still, despite the commitment and the rigorous verification processes employed by developers, software is deployed with faults. To increase the reliability of software systems, researchers have investigated the use of various form of redundancy. Informally, a software system is redunda...

  6. Numerical software: science or alchemy

    Energy Technology Data Exchange (ETDEWEB)

    Gear, C.W.

    1979-06-01

    This is a summary of the Forsythe lecture presented at the Computer Science Conference, Dayton, Ohio, in February 1979. It examines the activity called Numerical Software, first to see what distinguishes numerical software from any other form of software and why numerical software is so much more difficult. Then it examines the scientific basis of such software and discusses that is lacking in that basis.

  7. Flight Software Math Library

    Science.gov (United States)

    McComas, David

    2013-01-01

    The flight software (FSW) math library is a collection of reusable math components that provides typical math utilities required by spacecraft flight software. These utilities are intended to increase flight software quality reusability and maintainability by providing a set of consistent, well-documented, and tested math utilities. This library only has dependencies on ANSI C, so it is easily ported. Prior to this library, each mission typically created its own math utilities using ideas/code from previous missions. Part of the reason for this is that math libraries can be written with different strategies in areas like error handling, parameters orders, naming conventions, etc. Changing the utilities for each mission introduces risks and costs. The obvious risks and costs are that the utilities must be coded and revalidated. The hidden risks and costs arise in miscommunication between engineers. These utilities must be understood by both the flight software engineers and other subsystem engineers (primarily guidance navigation and control). The FSW math library is part of a larger goal to produce a library of reusable Guidance Navigation and Control (GN&C) FSW components. A GN&C FSW library cannot be created unless a standardized math basis is created. This library solves the standardization problem by defining a common feature set and establishing policies for the library s design. This allows the libraries to be maintained with the same strategy used in its initial development, which supports a library of reusable GN&C FSW components. The FSW math library is written for an embedded software environment in C. This places restrictions on the language features that can be used by the library. Another advantage of the FSW math library is that it can be used in the FSW as well as other environments like the GN&C analyst s simulators. This helps communication between the teams because they can use the same utilities with the same feature set and syntax.

  8. Interface-based software testing

    Directory of Open Access Journals (Sweden)

    Aziz Ahmad Rais

    2016-10-01

    Full Text Available Software quality is determined by assessing the characteristics that specify how it should work, which are verified through testing. If it were possible to touch, see, or measure software, it would be easier to analyze and prove its quality. Unfortunately, software is an intangible asset, which makes testing complex. This is especially true when software quality is not a question of particular functions that can be tested through a graphical user interface. The primary objective of software architecture is to design quality of software through modeling and visualization. There are many methods and standards that define how to control and manage quality. However, many IT software development projects still fail due to the difficulties involved in measuring, controlling, and managing software quality. Software quality failure factors are numerous. Examples include beginning to test software too late in the development process, or failing properly to understand, or design, the software architecture and the software component structure. The goal of this article is to provide an interface-based software testing technique that better measures software quality, automates software quality testing, encourages early testing, and increases the software’s overall testability

  9. "If I can't have you, no one can": development of a Relational Entitlement and Proprietariness Scale (REPS).

    Science.gov (United States)

    Hannawa, Annegret F; Spitzberg, Brian H; Wiering, Liesbeth; Teranishi, Christy

    2006-10-01

    Relational proprietariness and entitlement have been theoretically related to partner violence following the threat of relationship dissolution. To date, however, no measure has been employed to verify such accounts. A multistage item pool development and refinement strategy was employed, resulting in a 32-item measure with strong construct validity. An online survey administered to 279 students resulted in an interpretable factor structure of sexual proprietariness and entitlement, consisting of social, behavioral, and information control, and a potential factor of face threat reactivity. These factors added unique variance to the prediction of instrumental and expressive aggression, were related to self-esteem and attachment, and were not contaminated by social desirability. Recommendations for bolstering the face threat reactivity factor and future studies are suggested. This measure provides a new tool that contributes to the prediction of intimate partner violence.

  10. What Counts in Software Process?

    DEFF Research Database (Denmark)

    Cohn, Marisa

    2009-01-01

    In software development, there is an interplay between Software Process models and Software Process enactments. The former tends to be abstract descriptions or plans. The latter tends to be specific instantiations of some ideal procedure. In this paper, we examine the role of work artifacts...... of the relationship between artifacts and Software Process. The paper argues that Software Process is a generative system, which participants called “The Conversation,” that emerges out of the interplay between Software Process models and Software Process enactments....... and conversations in negotiating between prescriptions from a model and the contingencies that arise in an enactment. A qualitative field study at two Agile software development companies was conducted to investigate the role of artifacts in the software development work and the relationship between these artifacts...

  11. A software engineering process for safety-critical software application.

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Byung Heon; Kim, Hang Bae; Chang, Hoon Seon; Jeon, Jong Sun [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1995-02-01

    Application of computer software to safety-critical systems in on the increase. To be successful, the software must be designed and constructed to meet the functional and performance requirements of the system. For safety reason, the software must be demonstrated not only to meet these requirements, but also to operate safely as a component within the system. For longer-term cost consideration, the software must be designed and structured to ease future maintenance and modifications. This paper presents a software engineering process for the production of safety-critical software for a nuclear power plant. The presentation is expository in nature of a viable high quality safety-critical software development. It is based on the ideas of a rational design process and on the experience of the adaptation of such process in the production of the safety-critical software for the shutdown system number two of Wolsung 2, 3 and 4 nuclear power generation plants. This process is significantly different from a conventional process in terms of rigorous software development phases and software design techniques, The process covers documentation, design, verification and testing using mathematically precise notations and highly reviewable tabular format to specify software requirements and software requirements and software requirements and code against software design using static analysis. The software engineering process described in this paper applies the principle of information-hiding decomposition in software design using a modular design technique so that when a change is required or an error is detected, the affected scope can be readily and confidently located. it also facilitates a sense of high degree of confidence in the `correctness` of the software production, and provides a relatively simple and straightforward code implementation effort. 1 figs., 10 refs. (Author).

  12. Entitlement to vote in the Cantons of Geneva and Vaud and eligibility for election in the Canton of Vaud

    CERN Multimedia

    2006-01-01

    The Permanent Mission of Switzerland has informed CERN that some international civil servants and members of their families are henceforth entitled to vote on commune matters in the Canton of Geneva and are entitled to vote and are eligible for election at commune level in the Canton of Vaud. For further information, in particular regarding the special procedure to be followed to apply to exercise this entitlement, you are invited to consult the information published, in French only, on the Swiss Mission's website: http://www.dfae.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt1.html (for the Canton of Geneva), http://www.eda.admin.ch/eda/fr/home/topics/intorg/un/unge/gepri/manvot/manvt2.html (for the Canton of Vaud), In this regard, you are reminded that: Under Articles I 3.05 and I 3.07 of the Staff Rules, a member of the personnel 'may take part, outside the Organization, in the public and political life of a State in accordance with the relevant legislation' and 'express his own person...

  13. Transfer of single farm payment entitlements to farm successors: impact on structural change and rental prices in Switzerland

    Directory of Open Access Journals (Sweden)

    Gabriele Mack

    2013-09-01

    Full Text Available This paper analyses the impact of tradable and non-tradable single farm payment (SFP entitlements for farm successors on structural change and the lease market. Using the example of Swiss agriculture, the effects on rental-price trends and farm-exit rates are investigated. An ex-ante normative impact analysis is performed with the agent-based agricultural-sector model SWISSland, which simulates structural change processes and income trends in Swiss agriculture over a period of up to 15 years. A land market implemented at municipality level simulates the plot-by-plot leasing of land to surrounding neighbouring agents that is common in Switzerland. Allocation of plots to tenants as well as lease pricing is modelled taking into account the farm-specific land rents. The results show that personalised SFP entitlements which could not be transferred to a farm successor not only cause an intensification of structural change, but would also thus lead to a substantial reduction in rental prices. SFP entitlements which were successfully transferred to farm successors have only a slight impact on structural change and the rental prices of arable land. Only for grassland in the mountain region does a stronger shift result in a significant reduction in rental prices.

  14. Transboundary nuclear risks and legal entitlement to be protected under international law. Grenzueberschreitendes nukleares Risiko und voelkerrechtlicher Schutzanspruch

    Energy Technology Data Exchange (ETDEWEB)

    Handl, G.

    1992-01-01

    The study in hand examines the conditions supporting and governing the legal entitlement of a state affected by the potential hazards of a nuclear installation in a neighbouring state to be protected against such hazards, and to enforce such entitlement on a bilateral level, based on international law, in order to guarantee the integrity of the state's territory and its population. There are three basic items to be investigated: (1) the objective definition of the transboundary nuclear risk, which in the bilateral relationship between the risk-exposed state and the installation state creates a right to claim protection on the part of the exposed state; (2) the concrete definition of this bilateral entitlement to be protected from the nuclear risks, i.e. after an 'internationalization' of the decision-making processes underlying the erection and operation of nuclear installations and the subsequent waste management; (3) the international leagal obligations to be fulfilled to compensate for nuclear damage as a result of incidents or accidents in a nuclear installation. (orig./HP).

  15. Implementing Software Defined Radio

    CERN Document Server

    Grayver, Eugene

    2013-01-01

    Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these pages. The author covers the myriad options and trade-offs available when selecting an appropriate hardware architecture. As demonstrated here, the choice between hardware- and software-centric architecture can mean the difference between meeting an aggressive schedule and bogging down in endless design iterations. Because of the author’s experience overseeing dozens of failed and successful developments, he is able to present many real-life examples. Some of the key concepts covered are: Choosing the right architecture for the market – laboratory, military, or commercial Hardware platforms – FPGAs, GPPs, specialized and hybrid devices Standardization efforts to ens...

  16. Chemical recognition software

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, J.S.; Trahan, M.W.; Nelson, W.E.; Hargis, P.H. Jr.; Tisone, G.C.

    1994-06-01

    We have developed a capability to make real time concentration measurements of individual chemicals in a complex mixture using a multispectral laser remote sensing system. Our chemical recognition and analysis software consists of three parts: (1) a rigorous multivariate analysis package for quantitative concentration and uncertainty estimates, (2) a genetic optimizer which customizes and tailors the multivariate algorithm for a particular application, and (3) an intelligent neural net chemical filter which pre-selects from the chemical database to find the appropriate candidate chemicals for quantitative analyses by the multivariate algorithms, as well as providing a quick-look concentration estimate and consistency check. Detailed simulations using both laboratory fluorescence data and computer synthesized spectra indicate that our software can make accurate concentration estimates from complex multicomponent mixtures, even when the mixture is noisy and contaminated with unknowns.

  17. Chemical recognition software

    Energy Technology Data Exchange (ETDEWEB)

    Wagner, J.S.; Trahan, M.W.; Nelson, W.E.; Hargis, P.J. Jr.; Tisone, G.C.

    1994-12-01

    We have developed a capability to make real time concentration measurements of individual chemicals in a complex mixture using a multispectral laser remote sensing system. Our chemical recognition and analysis software consists of three parts: (1) a rigorous multivariate analysis package for quantitative concentration and uncertainty estimates, (2) a genetic optimizer which customizes and tailors the multivariate algorithm for a particular application, and (3) an intelligent neural net chemical filter which pre-selects from the chemical database to find the appropriate candidate chemicals for quantitative analyses by the multivariate algorithms, as well as providing a quick-look concentration estimate and consistency check. Detailed simulations using both laboratory fluorescence data and computer synthesized spectra indicate that our software can make accurate concentration estimates from complex multicomponent mixtures. even when the mixture is noisy and contaminated with unknowns.

  18. TOUGH2 software qualification

    Energy Technology Data Exchange (ETDEWEB)

    Pruess, K.; Simmons, A.; Wu, Y.S.; Moridis, G.

    1996-02-01

    TOUGH2 is a numerical simulation code for multi-dimensional coupled fluid and heat flow of multiphase, multicomponent fluid mixtures in porous and fractured media. It belongs to the MULKOM ({open_quotes}MULti-KOMponent{close_quotes}) family of codes and is a more general version of the TOUGH simulator. The MULKOM family of codes was originally developed with a focus on geothermal reservoir simulation. They are suited to modeling systems which contain different fluid mixtures, with applications to flow problems arising in the context of high-level nuclear waste isolation, oil and gas recovery and storage, and groundwater resource protection. TOUGH2 is essentially a subset of MULKOM, consisting of a selection of the better tested and documented MULKOM program modules. The purpose of this package of reports is to provide all software baseline documents necessary for the software qualification of TOUGH2.

  19. Event Filter Dataflow Software

    CERN Document Server

    Meessen, C; Bosman, M; Karr, K M; Pacheco, A; Qian, Z; Touchard, F

    2000-01-01

    This document describes the software handling the flow of events through the Event Filter. This is the fourth iteration of the implementation of the code. When compared to previous versions, enhancements come from the feedback by users and can be seen as simplifications while the interfaces have been kept identical. The high level design of the dataflow is briefly reminded. Then, the details of the implementation of the components are given.

  20. Spreadsheet Auditing Software

    OpenAIRE

    2010-01-01

    It is now widely accepted that errors in spreadsheets are both common and potentially dangerous. Further research has taken place to investigate how frequently these errors occur, what impact they have, how the risk of spreadsheet errors can be reduced by following spreadsheet design guidelines and methodologies, and how effective auditing of a spreadsheet is in the detection of these errors. However, little research exists to establish the usefulness of software tools in the auditing of spre...

  1. Software Reliability Study

    Science.gov (United States)

    1976-08-01

    8217.’ r tiy tziz zzl 4N - . . . .1-- . . . . . ..-_.. .._’. +/. . _ ... . . "- - 7 4 I _ -$1_L_ ’ i - igue43. Sfi Prolem . Nube ofrce (Sheet--6-of-10...3 I ..,i , I ,t.- " -T- Figure ~~ ~ -r 4--0 Softwar Pro--le-ms V-... Nube of.....lnPrgamLe -(Sheet 7 of 10) - ---- . - ,>1 IT -1 89 ..... - SLOPE

  2. ThermalTracker Software

    Energy Technology Data Exchange (ETDEWEB)

    2016-08-10

    The software processes recorded thermal video and detects the flight tracks of birds and bats that passed through the camera's field of view. The output is a set of images that show complete flight tracks for any detections, with the direction of travel indicated and the thermal image of the animal delineated. A report of the descriptive features of each detected track is also output in the form of a comma-separated value text file.

  3. Addressing Software Security

    Science.gov (United States)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  4. Software Systems Stockroom

    Science.gov (United States)

    2009-11-01

    mentioned, the SPP is maintained by Vanderbilt University and is distributed as open-source software via the ESCHER web portal. (Detailed, web-based SPP...user documentation is also maintained on the ESCHER site as well.) Due to this preexisting distribution mechanism, it was decided to leverage the...Contribute with data reach-back use case, and model the Stockroom SPP artifact with a URL link to the remote data payload (on the ESCHER web portal

  5. Statistical Software Engineering

    Science.gov (United States)

    2007-11-02

    Institute acts under the responsibility given to the National Academy of Sciences by its congressional charter to be an adviser to the federal government...research in software visualization—the use of typography, graphic design, animation, and cinematography to facilitate the understanding and...components. One of its major functions is to act as the central repository for all relevant project data (statistical or nonstatistical). Thus this

  6. Software Security Knowledge: Training

    Science.gov (United States)

    2011-05-01

    An Overview of the Steps: (IS C)’ ® 5-day CSSLP CB~ Education Program Educate yourself and leam security best practices and Industry standards for...the software llfecycle through the CSSLP Education Program.(lscr provides education your way to fit your life and schedule.Completlng this course will...Threat Classification last ed~ed by 8 Robert Auger 10 months, 3 weeks ago u Page hlstol’f ~ Check for plagiarism Threat Classification ’Taxonomy

  7. A Multitouch Software Architecture

    OpenAIRE

    Florian Echtler; Gudrun Klinker

    2017-01-01

    In recent years, a large amount of software for multitouch in- terfaces with various degrees of similarity has been written. In order to improve interoperability, we aim to identify the common traits of these systems and present a layered soft- ware architecture which abstracts these similarities by defin- ing common interfaces between these layers. This provides developers with a unified view of the various types of mul- titouch hardware. Moreover, the layered architecture allows easy integr...

  8. Unified Engineering Software System

    Science.gov (United States)

    Purves, L. R.; Gordon, S.; Peltzman, A.; Dube, M.

    1989-01-01

    Collection of computer programs performs diverse functions in prototype engineering. NEXUS, NASA Engineering Extendible Unified Software system, is research set of computer programs designed to support full sequence of activities encountered in NASA engineering projects. Sequence spans preliminary design, design analysis, detailed design, manufacturing, assembly, and testing. Primarily addresses process of prototype engineering, task of getting single or small number of copies of product to work. Written in FORTRAN 77 and PROLOG.

  9. Avoidable Software Procurements

    Science.gov (United States)

    2012-09-01

    SET) Adobe Desktop and Server software at up to 60% off GSA TLP level 1 pricing. Autodesk Included in this award are over two dozen AutoCAD and...environmentally friendly; less CDs/DVSs, less plastic CD/DVD covers, less cardboard packaging, and less paper manuals . D. THREATS 1. Security a...pilot. There were 54 test cases which were manually executed multiple times in order to evaluate how the proposed check-in/check-out pilot system would

  10. Software for Spatial Statistics

    Directory of Open Access Journals (Sweden)

    Edzer Pebesma

    2015-02-01

    Full Text Available We give an overview of the papers published in this special issue on spatial statistics, of the Journal of Statistical Software. 21 papers address issues covering visualization (micromaps, links to Google Maps or Google Earth, point pattern analysis, geostatistics, analysis of areal aggregated or lattice data, spatio-temporal statistics, Bayesian spatial statistics, and Laplace approximations. We also point to earlier publications in this journal on the same topic.

  11. Software for Spatial Statistics

    OpenAIRE

    Edzer Pebesma; Roger Bivand; Paulo Justiniano Ribeiro

    2015-01-01

    We give an overview of the papers published in this special issue on spatial statistics, of the Journal of Statistical Software. 21 papers address issues covering visualization (micromaps, links to Google Maps or Google Earth), point pattern analysis, geostatistics, analysis of areal aggregated or lattice data, spatio-temporal statistics, Bayesian spatial statistics, and Laplace approximations. We also point to earlier publications in this journal on the same topic.

  12. Software Intensive Systems

    Science.gov (United States)

    2006-07-01

    Not an acronym, the language was named after August Ada , Countess of Lovelace , purported to be the first programmer. ARCI/APB Acoustic Rapid COTS...Software Engineering Institute, has had a significant lasting effect. Two others were the creation of the Ada programming language and the STARS program...Definition ABM/GIFC Advanced Battle Manager/Global Integrated Fire Control Ada The name of the DOD programming language mandated in the 1980s

  13. Office software Individual coaching

    CERN Multimedia

    HR Department

    2010-01-01

    If one or several particular topics cause you sleepless nights, you can get the help of our trainer who will come to your workplace for a multiple of 1-hour slots . All fields in which our trainer can help are detailed in the course description in our training catalogue (Microsoft Office software, Adobe applications, i-applications etc.). Please discover these new courses in our catalogue! Tel. 74924

  14. The Software Engineering Prototype.

    Science.gov (United States)

    1983-06-01

    charts, graphics , color pictures, and other aids should be used to enhance communications between users and designers: verbal descripticns alone are just...ccncludes by showing how the set of seven desing elements are supported by software prototypes. B. TBE PROTOTYPE PRCCESS ’he terms rotc%_vPe and pRototype...formulation of the solution (and vice versa)--there is an explicit understanding between the desinger and user about basic assumptions that will be made

  15. Introduction to Software Design

    Science.gov (United States)

    1989-01-01

    providing a well-structured intro- duction to the use of formal methods. The section Jensen79 on specification of the UNIX filing system may in- Jensen, IL W...for Analysts and Programmers. Englewood Kernighan , B. W., and P. Plauger. Software Tools. Cliffs, N. J.: Prentice-Hall, 1984. ISBN 0-13- Reading... UNIX philosophy of providing small, independent tools and linking these together to pro- duce more powerful tools tailored for specific pur- poses

  16. Image Processing Software

    Science.gov (United States)

    1992-01-01

    To convert raw data into environmental products, the National Weather Service and other organizations use the Global 9000 image processing system marketed by Global Imaging, Inc. The company's GAE software package is an enhanced version of the TAE, developed by Goddard Space Flight Center to support remote sensing and image processing applications. The system can be operated in three modes and is combined with HP Apollo workstation hardware.

  17. Computer games and software engineering

    CERN Document Server

    Cooper, Kendra M L

    2015-01-01

    Computer games represent a significant software application domain for innovative research in software engineering techniques and technologies. Game developers, whether focusing on entertainment-market opportunities or game-based applications in non-entertainment domains, thus share a common interest with software engineers and developers on how to best engineer game software.Featuring contributions from leading experts in software engineering, the book provides a comprehensive introduction to computer game software development that includes its history as well as emerging research on the inte

  18. Terminological recommendations for software localization

    Directory of Open Access Journals (Sweden)

    Klaus-Dirk Schmitz

    2012-08-01

    Full Text Available After an explosive growth of data processing and software starting at the beginning of the 1980s, the software industry shifted toward a strong orientation in non-US markets at the beginning of the 1990s. Today we see the global marketing of software in almost all regions of the world. Since software is no longer used by IT experts only, and since European and national regulations require user interfaces, manuals and documentation to be provided in the language of the customer, the market for software translation, i.e. for software localization, is the fastest growing market in the translation business.

  19. Terminological recommendations for software localization

    Directory of Open Access Journals (Sweden)

    Klaus-Dirk Schmitz

    2009-03-01

    Full Text Available After an explosive growth of data processing and software starting at the beginning of the 1980s, the software industry shifted toward a strong orientation in non-US markets at the beginning of the 1990s. Today we see the global marketing of software in almost all regions of the world. Since software is no longer used by IT experts only, and since European and national regulations require user interfaces, manuals and documentation to be provided in the language of the customer, the market for software translation, i.e. for software localization, is the fastest growing market in the translation business.

  20. Wildlife software: procedures for publication of computer software

    Science.gov (United States)

    Samuel, M.D.

    1990-01-01

    Computers and computer software have become an integral part of the practice of wildlife science. Computers now play an important role in teaching, research, and management applications. Because of the specialized nature of wildlife problems, specific computer software is usually required to address a given problem (e.g., home range analysis). This type of software is not usually available from commercial vendors and therefore must be developed by those wildlife professionals with particular skill in computer programming. Current journal publication practices generally prevent a detailed description of computer software associated with new techniques. In addition, peer review of journal articles does not usually include a review of associated computer software. Thus, many wildlife professionals are usually unaware of computer software that would meet their needs or of major improvements in software they commonly use. Indeed most users of wildlife software learn of new programs or important changes only by word of mouth.

  1. The Ettention software package.

    Science.gov (United States)

    Dahmen, Tim; Marsalek, Lukas; Marniok, Nico; Turoňová, Beata; Bogachev, Sviatoslav; Trampert, Patrick; Nickels, Stefan; Slusallek, Philipp

    2016-02-01

    We present a novel software package for the problem "reconstruction from projections" in electron microscopy. The Ettention framework consists of a set of modular building-blocks for tomographic reconstruction algorithms. The well-known block iterative reconstruction method based on Kaczmarz algorithm is implemented using these building-blocks, including adaptations specific to electron tomography. Ettention simultaneously features (1) a modular, object-oriented software design, (2) optimized access to high-performance computing (HPC) platforms such as graphic processing units (GPU) or many-core architectures like Xeon Phi, and (3) accessibility to microscopy end-users via integration in the IMOD package and eTomo user interface. We also provide developers with a clean and well-structured application programming interface (API) that allows for extending the software easily and thus makes it an ideal platform for algorithmic research while hiding most of the technical details of high-performance computing. Copyright © 2015 Elsevier B.V. All rights reserved.

  2. FPGAs for software programmers

    CERN Document Server

    Hannig, Frank; Ziener, Daniel

    2016-01-01

    This book makes powerful Field Programmable Gate Array (FPGA) and reconfigurable technology accessible to software engineers by covering different state-of-the-art high-level synthesis approaches (e.g., OpenCL and several C-to-gates compilers). It introduces FPGA technology, its programming model, and how various applications can be implemented on FPGAs without going through low-level hardware design phases. Readers will get a realistic sense for problems that are suited for FPGAs and how to implement them from a software designer’s point of view. The authors demonstrate that FPGAs and their programming model reflect the needs of stream processing problems much better than traditional CPU or GPU architectures, making them well-suited for a wide variety of systems, from embedded systems performing sensor processing to large setups for Big Data number crunching. This book serves as an invaluable tool for software designers and FPGA design engineers who are interested in high design productivity through behavi...

  3. JPI UML Software Modeling

    Directory of Open Access Journals (Sweden)

    Cristian Vidal Silva

    2015-12-01

    Full Text Available Aspect-Oriented Programming AOP extends object-oriented programming OOP with aspects to modularize crosscutting behavior on classes by means of aspects to advise base code in the occurrence of join points according to pointcut rules definition. However, join points introduce dependencies between aspects and base code, a great issue to achieve an effective independent development of software modules. Join Point Interfaces JPI represent join points using interfaces between classes and aspect, thus these modules do not depend of each other. Nevertheless, since like AOP, JPI is a programming methodology; thus, for a complete aspect-oriented software development process, it is necessary to define JPI requirements and JPI modeling phases. Towards previous goal, this article proposes JPI UML class and sequence diagrams for modeling JPI software solutions. A purpose of these diagrams is to facilitate understanding the structure and behavior of JPI programs. As an application example, this article applies the JPI UML diagrams proposal on a case study and analyzes the associated JPI code to prove their hegemony.

  4. The ALMA software architecture

    Science.gov (United States)

    Schwarz, Joseph; Farris, Allen; Sommer, Heiko

    2004-09-01

    The software for the Atacama Large Millimeter Array (ALMA) is being developed by many institutes on two continents. The software itself will function in a distributed environment, from the 0.5-14 kmbaselines that separate antennas to the larger distances that separate the array site at the Llano de Chajnantor in Chile from the operations and user support facilities in Chile, North America and Europe. Distributed development demands 1) interfaces that allow separated groups to work with minimal dependence on their counterparts at other locations; and 2) a common architecture to minimize duplication and ensure that developers can always perform similar tasks in a similar way. The Container/Component model provides a blueprint for the separation of functional from technical concerns: application developers concentrate on implementing functionality in Components, which depend on Containers to provide them with services such as access to remote resources, transparent serialization of entity objects to XML, logging, error handling and security. Early system integrations have verified that this architecture is sound and that developers can successfully exploit its features. The Containers and their services are provided by a system-orienteddevelopment team as part of the ALMA Common Software (ACS), middleware that is based on CORBA.

  5. Terra Harvest software architecture

    Science.gov (United States)

    Humeniuk, Dave; Klawon, Kevin

    2012-06-01

    Under the Terra Harvest Program, the DIA has the objective of developing a universal Controller for the Unattended Ground Sensor (UGS) community. The mission is to define, implement, and thoroughly document an open architecture that universally supports UGS missions, integrating disparate systems, peripherals, etc. The Controller's inherent interoperability with numerous systems enables the integration of both legacy and future UGS System (UGSS) components, while the design's open architecture supports rapid third-party development to ensure operational readiness. The successful accomplishment of these objectives by the program's Phase 3b contractors is demonstrated via integration of the companies' respective plug-'n'-play contributions that include controllers, various peripherals, such as sensors, cameras, etc., and their associated software drivers. In order to independently validate the Terra Harvest architecture, L-3 Nova Engineering, along with its partner, the University of Dayton Research Institute, is developing the Terra Harvest Open Source Environment (THOSE), a Java Virtual Machine (JVM) running on an embedded Linux Operating System. The Use Cases on which the software is developed support the full range of UGS operational scenarios such as remote sensor triggering, image capture, and data exfiltration. The Team is additionally developing an ARM microprocessor-based evaluation platform that is both energy-efficient and operationally flexible. The paper describes the overall THOSE architecture, as well as the design decisions for some of the key software components. Development process for THOSE is discussed as well.

  6. Software design practice using two SCADA software packages

    DEFF Research Database (Denmark)

    Basse, K.P.; Christensen, Georg Kronborg; Frederiksen, P. K.

    1996-01-01

    Typical software development for manufacturing control is done either by specialists with consideral real-time programming experience or done by the adaptation of standard software packages for manufacturing control. After investigation and test of two commercial software packages: "InTouch" and ......Touch" and "Fix", it is argued, that a more efficient software solution can be achieved by utilising an integrated specification for SCADA and PLC-programming. Experiences gained from process control is planned investigated for descrete parts manufacturing....

  7. Software design practice using two SCADA software packages

    DEFF Research Database (Denmark)

    Basse, K.P.; Christensen, Georg Kronborg; Frederiksen, P. K.

    1996-01-01

    Typical software development for manufacturing control is done either by specialists with consideral real-time programming experience or done by the adaptation of standard software packages for manufacturing control. After investigation and test of two commercial software packages: "InTouch" and ......Touch" and "Fix", it is argued, that a more efficient software solution can be achieved by utilising an integrated specification for SCADA and PLC-programming. Experiences gained from process control is planned investigated for descrete parts manufacturing....

  8. AN ALGORITHMIC AND SOFTWARE ENGINEERING BASED APPROACH TO ROBUST VIDEO GAME DESIGN

    Directory of Open Access Journals (Sweden)

    Hollie Boudreaux

    2011-08-01

    Full Text Available Design and development of a large video game is a challenging software engineering and projectmanagement problem. Thus, it is a non-trivial task. This paper describes the design and development of agame, entitled N-STAL, which embodies nearly every aspect of game design and implementation,including researching, crafting of assets, selection and usage of proper tools, software development,testing, and team play. Key software engineering principles are followed throughout the design,development, and validation stages. Successful execution of such design and development in an academicsetting inspires team-based learning in students. It challenges them to meet project deadlines, preparesthem for life-long learning, and helps them understand some of the challenges that are faced withmodeling, simulation, and user interfacing.

  9. Software engineering methodologies and tools

    Science.gov (United States)

    Wilcox, Lawrence M.

    1993-01-01

    Over the years many engineering disciplines have developed, including chemical, electronic, etc. Common to all engineering disciplines is the use of rigor, models, metrics, and predefined methodologies. Recently, a new engineering discipline has appeared on the scene, called software engineering. For over thirty years computer software has been developed and the track record has not been good. Software development projects often miss schedules, are over budget, do not give the user what is wanted, and produce defects. One estimate is there are one to three defects per 1000 lines of deployed code. More and more systems are requiring larger and more complex software for support. As this requirement grows, the software development problems grow exponentially. It is believed that software quality can be improved by applying engineering principles. Another compelling reason to bring the engineering disciplines to software development is productivity. It has been estimated that productivity of producing software has only increased one to two percent a year in the last thirty years. Ironically, the computer and its software have contributed significantly to the industry-wide productivity, but computer professionals have done a poor job of using the computer to do their job. Engineering disciplines and methodologies are now emerging supported by software tools that address the problems of software development. This paper addresses some of the current software engineering methodologies as a backdrop for the general evaluation of computer assisted software engineering (CASE) tools from actual installation of and experimentation with some specific tools.

  10. The software invention cube: A classification scheme for software inventions

    NARCIS (Netherlands)

    Bergstra, J.A.; Klint, P.

    2008-01-01

    The patent system protects inventions. The requirement that a software invention should make ‘a technical contribution’ turns out to be untenable in practice and this raises the question, what constitutes an invention in the realm of software. The authors developed the Software Invention Cube (SWIC)

  11. The software invention cube: A classification scheme for software inventions

    NARCIS (Netherlands)

    J.A. Bergstra; P. Klint (Paul)

    2008-01-01

    htmlabstractThe patent system protects inventions. The requirement that a software invention should make ‘a technical contribution’ turns out to be untenable in practice and this raises the question, what constitutes an invention in the realm of software. The authors developed the Software Invention

  12. Improving Software Citation and Credit

    CERN Document Server

    Allen, Alice; DuPrie, Kimberly; Mink, Jessica; Nemiroff, Robert; Robitaille, Thomas; Shamir, Lior; Shortridge, Keith; Taylor, Mark; Teuben, Peter; Wallin, John

    2015-01-01

    The past year has seen movement on several fronts for improving software citation, including the Center for Open Science's Transparency and Openness Promotion (TOP) Guidelines, the Software Publishing Special Interest Group that was started at January's AAS meeting in Seattle at the request of that organization's Working Group on Astronomical Software, a Sloan-sponsored meeting at GitHub in San Francisco to begin work on a cohesive research software citation-enabling platform, the work of Force11 to "transform and improve" research communication, and WSSSPE's ongoing efforts that include software publication, citation, credit, and sustainability. Brief reports on these efforts were shared at the BoF, after which participants discussed ideas for improving software citation, generating a list of recommendations to the community of software authors, journal publishers, ADS, and research authors. The discussion, recommendations, and feedback will help form recommendations for software citation to those publishers...

  13. Software Engineering for Human Spaceflight

    Science.gov (United States)

    Fredrickson, Steven E.

    2014-01-01

    The Spacecraft Software Engineering Branch of NASA Johnson Space Center (JSC) provides world-class products, leadership, and technical expertise in software engineering, processes, technology, and systems management for human spaceflight. The branch contributes to major NASA programs (e.g. ISS, MPCV/Orion) with in-house software development and prime contractor oversight, and maintains the JSC Engineering Directorate CMMI rating for flight software development. Software engineering teams work with hardware developers, mission planners, and system operators to integrate flight vehicles, habitats, robotics, and other spacecraft elements. They seek to infuse automation and autonomy into missions, and apply new technologies to flight processor and computational architectures. This presentation will provide an overview of key software-related projects, software methodologies and tools, and technology pursuits of interest to the JSC Spacecraft Software Engineering Branch.

  14. Capturing the impact of software

    Science.gov (United States)

    Piwowar, Heather

    2017-01-01

    Research software is undervalued in funding and tenure decisions because its impact is poorly evaluated within the traditional paper-based ecosystem. The talk presents the NSF-funded Depsy project (http://depsy.org) -- a proof-of-concept system designed to address this problem by tracking the impact of software in software-native ways. Depsy finds mentions of software itself in the literature, rather than just counting citations to a wrapper paper about the software. It discovers how software gets reused by other software, even when it's not cited at all. And finally Depsy attempts to represent the full complexity of software authorship, where one project can involve hundreds of contributors in multiple roles that don't map to traditional paper authorship.

  15. Handling Software Faults with Redundancy

    Science.gov (United States)

    Carzaniga, Antonio; Gorla, Alessandra; Pezzè, Mauro

    Software engineering methods can increase the dependability of software systems, and yet some faults escape even the most rigorous and methodical development process. Therefore, to guarantee high levels of reliability in the presence of faults, software systems must be designed to reduce the impact of the failures caused by such faults, for example by deploying techniques to detect and compensate for erroneous runtime conditions. In this chapter, we focus on software techniques to handle software faults, and we survey several such techniques developed in the area of fault tolerance and more recently in the area of autonomic computing. Since practically all techniques exploit some form of redundancy, we consider the impact of redundancy on the software architecture, and we propose a taxonomy centered on the nature and use of redundancy in software systems. The primary utility of this taxonomy is to classify and compare techniques to handle software faults.

  16. Software Quality Assurance Audits Guidebooks

    Science.gov (United States)

    1990-01-01

    The growth in cost and importance of software to NASA has caused NASA to address the improvement of software development across the agency. One of the products of this program is a series of guidebooks that define a NASA concept of the assurance processes that are used in software development. The Software Assurance Guidebook, NASA-GB-A201, issued in September, 1989, provides an overall picture of the NASA concepts and practices in software assurance. Second level guidebooks focus on specific activities that fall within the software assurance discipline, and provide more detailed information for the manager and/or practitioner. This is the second level Software Quality Assurance Audits Guidebook that describes software quality assurance audits in a way that is compatible with practices at NASA Centers.

  17. Clustering Methodologies for Software Engineering

    Directory of Open Access Journals (Sweden)

    Mark Shtern

    2012-01-01

    Full Text Available The size and complexity of industrial strength software systems are constantly increasing. This means that the task of managing a large software project is becoming even more challenging, especially in light of high turnover of experienced personnel. Software clustering approaches can help with the task of understanding large, complex software systems by automatically decomposing them into smaller, easier-to-manage subsystems. The main objective of this paper is to identify important research directions in the area of software clustering that require further attention in order to develop more effective and efficient clustering methodologies for software engineering. To that end, we first present the state of the art in software clustering research. We discuss the clustering methods that have received the most attention from the research community and outline their strengths and weaknesses. Our paper describes each phase of a clustering algorithm separately. We also present the most important approaches for evaluating the effectiveness of software clustering.

  18. Design Principles for Interactive Software

    DEFF Research Database (Denmark)

    The book addresses the crucial intersection of human-computer interaction (HCI) and software engineering by asking both what users require from interactive systems and what developers need to produce well-engineered software. Needs are expressed as......The book addresses the crucial intersection of human-computer interaction (HCI) and software engineering by asking both what users require from interactive systems and what developers need to produce well-engineered software. Needs are expressed as...

  19. Formal aspects of component software

    OpenAIRE

    Sun, Meng; Schatz, B.

    2014-01-01

    This issue includes extended versions of selected best papers from the 7th International Workshop on Formal Aspects of Component Software (FACS 2010) held in Guimarães, Portugal on October 14–16, 2010. The component-based software development approach has emerged as a promising paradigm to cope with an ever increasing complexity of present-day software solutions by bringing sound production and engineering principles into software engineering. However, many conceptual and technological iss...

  20. Software engineering a practitioner's approach

    CERN Document Server

    Pressman, Roger S

    1997-01-01

    This indispensable guide to software engineering exploration enables practitioners to navigate the ins and outs of this rapidly changing field. Pressman's fully revised and updated Fourth Edition provides in-depth coverage of every important management and technical topic in software engineering. Moreover, readers will find the inclusion of the hottest developments in the field such as: formal methods and cleanroom software engineering, business process reengineering, and software reengineering.

  1. Teaching Software Engineering through Robotics

    OpenAIRE

    Shin, Jiwon; Rusakov, Andrey; Meyer, Bertrand

    2014-01-01

    This paper presents a newly-developed robotics programming course and reports the initial results of software engineering education in robotics context. Robotics programming, as a multidisciplinary course, puts equal emphasis on software engineering and robotics. It teaches students proper software engineering -- in particular, modularity and documentation -- by having them implement four core robotics algorithms for an educational robot. To evaluate the effect of software engineering educati...

  2. Software Security Requirements Gathering Instrument

    OpenAIRE

    2011-01-01

    Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured software is through gathering security requirements. This paper describes Software Security Requirements Gathering Instrument (SSRGI) that helps gather security requirements from the various stakeholders. This will guide the developers to gather security requirements along with th...

  3. Software Validation using Power Profiles

    OpenAIRE

    Lencevicius, Raimondas; Metz, Edu; Ran, Alexander

    2002-01-01

    The validation of modern software systems incorporates both functional and quality requirements. This paper proposes a validation approach for software quality requirement - its power consumption. This approach validates whether the software produces the desired results with a minimum expenditure of energy. We present energy requirements and an approach for their validation using a power consumption model, test-case specification, software traces, and power measurements. Three different appro...

  4. The Software Management Environment (SME)

    Science.gov (United States)

    Valett, Jon D.; Decker, William; Buell, John

    1988-01-01

    The Software Management Environment (SME) is a research effort designed to utilize the past experiences and results of the Software Engineering Laboratory (SEL) and to incorporate this knowledge into a tool for managing projects. SME provides the software development manager with the ability to observe, compare, predict, analyze, and control key software development parameters such as effort, reliability, and resource utilization. The major components of the SME, the architecture of the system, and examples of the functionality of the tool are discussed.

  5. GNSS Software Receiver for UAVs

    DEFF Research Database (Denmark)

    Olesen, Daniel Madelung; Jakobsen, Jakob; von Benzon, Hans-Henrik

    2016-01-01

    This paper describes the current activities of GPS/GNSS Software receiver development at DTU Space. GNSS Software receivers have received a great deal of attention in the last two decades and numerous implementations have already been presented. DTU Space has just recently started development of ...... of our own GNSS software-receiver targeted for mini UAV applications, and we will in in this paper present our current progress and briefly discuss the benefits of Software Receivers in relation to our research interests....

  6. Gammasphere software development. Progress report

    Energy Technology Data Exchange (ETDEWEB)

    Piercey, R.B.

    1994-01-01

    This report describes the activities of the nuclear physics group at Mississippi State University which were performed during 1993. Significant progress has been made in the focus areas: chairing the Gammasphere Software Working Group (SWG); assisting with the porting and enhancement of the ORNL UPAK histogramming software package; and developing standard formats for Gammasphere data products. In addition, they have established a new public ftp archive to distribute software and software development tools and information.

  7. Research on Software-Cell-Based Software System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The aim of research on software architecture is to improve the quality attributes of software sys tems, such as security, reliability, maintainability, testability , reassembility , evolvability. However, a sin gle running system is hard to achieve all these goals. In this paper, software-cell is introduced as the basic u nit throughout developing process. Then it is further advanced that a robust, safe and high-quality software system is composed of a running system and four supportive systems. This paper especially discusses the structure of software-cell, the construction of the five systems, and the relations between them.

  8. Model-based Software Engineering

    DEFF Research Database (Denmark)

    2010-01-01

    The vision of model-based software engineering is to make models the main focus of software development and to automatically generate software from these models. Part of that idea works already today. But, there are still difficulties when it comes to behaviour. Actually, there is no lack in models...

  9. Free Software and Free Textbooks

    Science.gov (United States)

    Takhteyev, Yuri

    2012-01-01

    Some of the world's best and most sophisticated software is distributed today under "free" or "open source" licenses, which allow the recipients of such software to use, modify, and share it without paying royalties or asking for permissions. If this works for software, could it also work for educational resources, such as books? The economics of…

  10. NASA's Approach to Software Assurance

    Science.gov (United States)

    Wetherholt, Martha

    2015-01-01

    NASA defines software assurance as: the planned and systematic set of activities that ensure conformance of software life cycle processes and products to requirements, standards, and procedures via quality, safety, reliability, and independent verification and validation. NASA's implementation of this approach to the quality, safety, reliability, security and verification and validation of software is brought together in one discipline, software assurance. Organizationally, NASA has software assurance at each NASA center, a Software Assurance Manager at NASA Headquarters, a Software Assurance Technical Fellow (currently the same person as the SA Manager), and an Independent Verification and Validation Organization with its own facility. An umbrella risk mitigation strategy for safety and mission success assurance of NASA's software, software assurance covers a wide area and is better structured to address the dynamic changes in how software is developed, used, and managed, as well as it's increasingly complex functionality. Being flexible, risk based, and prepared for challenges in software at NASA is essential, especially as much of our software is unique for each mission.

  11. Software product lines : Organizational alternatives

    NARCIS (Netherlands)

    Bosch, J

    2001-01-01

    Software product lines enjoy increasingly wide adoption in the software industry. Most authors focus on the technical and process aspects and assume an organizational model consisting of a domain engineering unit and several application engineering units. In our cooperation with several software dev

  12. Free Software and Free Textbooks

    Science.gov (United States)

    Takhteyev, Yuri

    2012-01-01

    Some of the world's best and most sophisticated software is distributed today under "free" or "open source" licenses, which allow the recipients of such software to use, modify, and share it without paying royalties or asking for permissions. If this works for software, could it also work for educational resources, such as books? The economics of…

  13. Model-based Software Engineering

    DEFF Research Database (Denmark)

    2010-01-01

    The vision of model-based software engineering is to make models the main focus of software development and to automatically generate software from these models. Part of that idea works already today. But, there are still difficulties when it comes to behaviour. Actually, there is no lack in models...

  14. Software Startups - A Research Agenda

    Directory of Open Access Journals (Sweden)

    Michael Unterkalmsteiner

    2016-10-01

    Full Text Available Software startup companies develop innovative, software-intensive products within limited time frames and with few resources, searching for sustainable and scalable business models. Software startups are quite distinct from traditional mature software companies, but also from micro-, small-, and medium-sized enterprises, introducing new challenges relevant for software engineering research. This paper's research agenda focuses on software engineering in startups, identifying, in particular, 70+ research questions in the areas of supporting startup engineering activities, startup evolution models and patterns, ecosystems and innovation hubs, human aspects in software startups, applying startup concepts in non-startup environments, and methodologies and theories for startup research. We connect and motivate this research agenda with past studies in software startup research, while pointing out possible future directions. While all authors of this research agenda have their main background in Software Engineering or Computer Science, their interest in software startups broadens the perspective to the challenges, but also to the opportunities that emerge from multi-disciplinary research. Our audience is therefore primarily software engineering researchers, even though we aim at stimulating collaborations and research that crosses disciplinary boundaries. We believe that with this research agenda we cover a wide spectrum of the software startup industry current needs.

  15. Software product lines : Organizational alternatives

    NARCIS (Netherlands)

    Bosch, J

    2001-01-01

    Software product lines enjoy increasingly wide adoption in the software industry. Most authors focus on the technical and process aspects and assume an organizational model consisting of a domain engineering unit and several application engineering units. In our cooperation with several software

  16. Software product lines : Organizational alternatives

    NARCIS (Netherlands)

    Bosch, J

    2001-01-01

    Software product lines enjoy increasingly wide adoption in the software industry. Most authors focus on the technical and process aspects and assume an organizational model consisting of a domain engineering unit and several application engineering units. In our cooperation with several software dev

  17. Visual assessment of software evolution

    NARCIS (Netherlands)

    Voinea, Lucian; Lukkien, Johan; Telea, Alexandru

    2007-01-01

    Configuration management tools have become well and widely accepted by the software industry. Software Configuration Management (SCM) systems hold minute information about the entire evolution of complex software systems and thus represent a good source for process accounting and auditing. However,

  18. Visual assessment of software evolution

    NARCIS (Netherlands)

    Voinea, Lucian; Lukkien, Johan; Telea, Alexandru

    2007-01-01

    Configuration management tools have become well and widely accepted by the software industry. Software Configuration Management (SCM) systems hold minute information about the entire evolution of complex software systems and thus represent a good source for process accounting and auditing. However,

  19. Software Vulnerability Taxonomy Consolidation

    Energy Technology Data Exchange (ETDEWEB)

    Polepeddi, Sriram S. [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2004-12-07

    In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of a particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data

  20. Software is a directed multigraph (and so is software process)

    CERN Document Server

    Dabrowski, Robert; Timoszuk, Grzegorz

    2011-01-01

    For a software system, its architecture is typically defined as the fundamental organization of the system incorporated by its components, their relationships to one another and their environment, and the principles governing their design. If contributed to by the artifacts coresponding to engineering processes that govern the system's evolution, the definition gets natually extended into the architecture of software and software process. Obviously, as long as there were no software systems, managing their architecture was no problem at all; when there were only small systems, managing their architecture became a mild problem; and now we have gigantic software systems, and managing their architecture has become an equally gigantic problem (to paraphrase Edsger Dijkstra). In this paper we propose a simple, yet we believe effective, model for organizing architecture of software systems. First of all we postulate that only a hollistic approach that supports continuous integration and verification for all softwar...

  1. Software Design Improvements. Part 1; Software Benefits and Limitations

    Science.gov (United States)

    Lalli, Vincent R.; Packard, Michael H.; Ziemianski, Tom

    1997-01-01

    Computer hardware and associated software have been used for many years to process accounting information, to analyze test data and to perform engineering analysis. Now computers and software also control everything from automobiles to washing machines and the number and type of applications are growing at an exponential rate. The size of individual program has shown similar growth. Furthermore, software and hardware are used to monitor and/or control potentially dangerous products and safety-critical systems. These uses include everything from airplanes and braking systems to medical devices and nuclear plants. The question is: how can this hardware and software be made more reliable? Also, how can software quality be improved? What methodology needs to be provided on large and small software products to improve the design and how can software be verified?

  2. The software factory: A fourth generation software engineering environment

    Energy Technology Data Exchange (ETDEWEB)

    Evans, M.W.

    1989-01-01

    The software-development process and its management are examined in a text intended for engineering managers and students of computer science. A unified concept based on the principle that software design is an engineering science rather than an art is applied, and a software engineering environment (SEE) analogous to an industrial plant is proposed. Chapters are devoted to the classical software environment, the history of software engineering, the evolution of the SEE, the fourth-generation SEE, the engineering process, software-data relationships, the SEE data base, data control in the SEE, software life cycles, information-system product assurance, business management and control, and automating and adapting the SEE. 143 refs.

  3. An Entitlement Approach to Address the Water-Energy-Food Nexus in Rural India

    Science.gov (United States)

    Siegfried, T. U.; Fishman, R.; Modi, V.; Lall, U.

    2008-12-01

    prices and rainfall patterns due to climate change only enhance these concerns. Given these deficiencies, any corrective strategy should at least target the following long-term policy goals: a) increase the efficiency of rural electricity consumption in terms of grain production and rural income, b) providing the farmers greater flexibility with timely, high quality energy and more efficient means of production, c) enable proper energy accounting on the use side so as to recover costs at sufficient levels for the SEBs and thus enable long-term investments in energy infrastructure and d) secure and eventually increase agricultural production without depleting groundwater resources over the long run. We will present an entitlement approach with which the above issues can be addressed in the future. A case study example from the semi-arid Telangana Region in Andhra Pradesh will be discussed in depth and preliminary results shown.

  4. Self-organising software

    CERN Document Server

    Serugendo, Giovanna Di Marzo; Karageorgos, Anthony

    2011-01-01

    Self-organisation, self-regulation, self-repair and self-maintenance are promising conceptual approaches for dealing with complex distributed interactive software and information-handling systems. Self-organising applications dynamically change their functionality and structure without direct user intervention, responding to changes in requirements and the environment. This is the first book to offer an integrated view of self-organisation technologies applied to distributed systems, particularly focusing on multiagent systems. The editors developed this integrated book with three aims: to exp

  5. Open Source Software Acquisition

    DEFF Research Database (Denmark)

    Holck, Jesper; Kühn Pedersen, Mogens; Holm Larsen, Michael

    2005-01-01

    Lately we have seen a growing interest from both public and private organisations to adopt OpenSource Software (OSS), not only for a few, specific applications but also on a more general levelthroughout the organisation. As a consequence, the organisations' decisions on adoption of OSS arebecoming......, in smaller organisations and in small-scale adoption of OSS, the cheapprice of OSS is a major enabler, as it provides a good opportunity for experiments and short-termeconomic benefits. For small organisations these experiments can lead to development of a commonIT-architecture, and in larger organisations...

  6. Office software Individual coaching

    CERN Multimedia

    HR Department

    2010-01-01

    If one or several particular topics cause you sleepless nights, you can get help from our trainer who will come to your workplace for a multiple of 1-hour slots . All fields in which our trainer can help are detailed in the course description in our training catalogue (Microsoft Office software, Adobe applications, i-applications etc.) Discover these new courses in our catalogue! http://cta.cern.ch/cta2/f?p=110:9 Technical Training Service Technical.Training@cern.ch Tel 74924

  7. Software Process Improvement

    DEFF Research Database (Denmark)

    Kuhrmann, Marco; Konopka, Claudia; Nellemann, Peter

    2016-01-01

    Software process improvement (SPI) is around for decades: frameworks are proposed, success factors are studied, and experiences have been reported. However, the sheer mass of concepts, approaches, and standards published over the years overwhelms practitioners as well as researchers. What is out...... directions. An analysis of 635 publications draws a big picture of SPI-related research of the past 25 years. Our study shows a high number of solution proposals, experience reports, and secondary studies, but only few theories. In particular, standard SPI models are analyzed and evaluated for applicability...

  8. Entretian Model for Software Maintenance

    Directory of Open Access Journals (Sweden)

    Priya K Betala

    2013-10-01

    Full Text Available Maintenance refers to the act of modifying the software after putting in use in order to maintain its usability.[1]. In other words, Software maintenance can be defined as; it is the process of providing services to the customers after the delivery of the software. Despite the fact that maintaining software is very challenging, it is the most important routine that must be carried out in the development cycle. If the software is not maintained efficiently it may lead to the death of the software. Maintenance of software may be carried out in two ways. The first one is called „In-house maintenance‟ and the second one is called „Transition maintenance‟. The latter faces the drastic challenges when compared to former, as one team may not provide complete source code to the other, leading to unstructured code, lack of appropriate technique and knowledge about the functioning of the current software. There are a few aspects of software maintenance that set it apart from the other phases. Software maintenance cost comprises more than half of the total software development cost. Also, without software maintenance, it is impossible to change the problems within the product after its release, and many disasters can happen because of immature software. Recognising the importance of software maintenance, this paper proposes a model called “ENTRETIAN MODEL” (Entretian, a French word meaning Maintenance which consists of six basic steps to follow while maintaining software system. This model overcomes certain misconceptions about maintenance phase and it is highly beneficial to the Maintenance Support Team (MST to handle their maintenance activities systematically and efficiently. By employing the proposed model, the MST is able to overcome the technical and managerial issues that are faced earlier in the maintenance phase. The advantage of using “Entretian Model” is best illustrated in this paper with the help of the ERP package.

  9. Characteristics for Software Optimization Projects

    Directory of Open Access Journals (Sweden)

    Iulian NITESCU

    2008-01-01

    Full Text Available The increasing of the software systems complexity imposes the identification and implementation of some methods and techniques in order to manage it. The software optimization project is a way in which the software complexity is controlled. The software optimization project must face to the organization need to earn profit. The software optimization project is an integrated part of the application cycle because share same resources, depends on other stages and influences next phases. The optimization project has some particularities because it works on an finished product around its quality. The process is quality and performance oriented and it assumes that the product life cycle is almost finished.

  10. The Ragnarok Software Development Environment

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    1999-01-01

    Ragnarok is an experimental software development environment that focuses on enhanced support for managerial activities in large scale software development taking the daily work of the software developer as its point of departure. The main emphasis is support in three areas: management, navigation......, and collaboration. The leitmotif is the software architecture, which is extended to handle managerial data in addition to source code; this extended software architecture is put under tight version- and configuration management control and furthermore used as basis for visualisation. Preliminary results of using...

  11. Software-Defined Cluster

    Institute of Scientific and Technical Information of China (English)

    聂华; 杨晓君; 刘淘英

    2015-01-01

    The cluster architecture has played an important role in high-end computing for the past 20 years. With the advent of Internet services, big data, and cloud computing, traditional clusters face three challenges: 1) providing flexible system balance among computing, memory, and I/O capabilities;2) reducing resource pooling overheads;and 3) addressing low performance-power efficiency. This position paper proposes a software-defined cluster (SDC) architecture to deal with these challenges. The SDC architecture inherits two features of traditional cluster: its architecture is multicomputer and it has loosely-coupled interconnect. SDC provides two new mechanisms: global I/O space (GIO) and hardware-supported native access (HNA) to remote devices. Application software can define a virtual cluster best suited to its needs from resources pools provided by a physical cluster, and traditional cluster ecosystems need no modification. We also discuss a prototype design and implementation of a 32-processor cloud server utilizing the SDC architecture.

  12. Software and Computing News

    CERN Multimedia

    Barberis, D

    The last several months have been very busy ones for the ATLAS software developers. They've been trying to cope with the competing demands of multiple software stress tests and testbeds. These include Data Challenge Two (DC2), the Combined Testbeam (CTB), preparations for the Physics Workshop to be held in Rome in June 2005, and other testbeds, primarily one for the High-Level Trigger. Data Challenge 2 (DC2) The primary goal of this was to validate the computing model and to provide a test of simulating a day's worth of ATLAS data (10 million events) and of fully processing it and making it available to the physicists within 10 days (i.e. a 10% scale test). DC2 consists of three parts - the generation, simulation, and mixing of a representative sample of physics events with background events; the reconstruction of the mixed samples with initial classification into the different physics signatures; and the distribution of the data to multiple remote sites (Tier-1 centers) for analysis by physicists. Figu...

  13. CSAM Metrology Software Tool

    Science.gov (United States)

    Vu, Duc; Sandor, Michael; Agarwal, Shri

    2005-01-01

    CSAM Metrology Software Tool (CMeST) is a computer program for analysis of false-color CSAM images of plastic-encapsulated microcircuits. (CSAM signifies C-mode scanning acoustic microscopy.) The colors in the images indicate areas of delamination within the plastic packages. Heretofore, the images have been interpreted by human examiners. Hence, interpretations have not been entirely consistent and objective. CMeST processes the color information in image-data files to detect areas of delamination without incurring inconsistencies of subjective judgement. CMeST can be used to create a database of baseline images of packages acquired at given times for comparison with images of the same packages acquired at later times. Any area within an image can be selected for analysis, which can include examination of different delamination types by location. CMeST can also be used to perform statistical analyses of image data. Results of analyses are available in a spreadsheet format for further processing. The results can be exported to any data-base-processing software.

  14. Software Defined Cyberinfrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Foster, Ian; Blaiszik, Ben; Chard, Kyle; Chard, Ryan

    2017-07-17

    Within and across thousands of science labs, researchers and students struggle to manage data produced in experiments, simulations, and analyses. Largely manual research data lifecycle management processes mean that much time is wasted, research results are often irreproducible, and data sharing and reuse remain rare. In response, we propose a new approach to data lifecycle management in which researchers are empowered to define the actions to be performed at individual storage systems when data are created or modified: actions such as analysis, transformation, copying, and publication. We term this approach software-defined cyberinfrastructure because users can implement powerful data management policies by deploying rules to local storage systems, much as software-defined networking allows users to configure networks by deploying rules to switches.We argue that this approach can enable a new class of responsive distributed storage infrastructure that will accelerate research innovation by allowing any researcher to associate data workflows with data sources, whether local or remote, for such purposes as data ingest, characterization, indexing, and sharing. We report on early experiments with this approach in the context of experimental science, in which a simple if-trigger-then-action (IFTA) notation is used to define rules.

  15. New ATLAS Software & Computing Organization

    CERN Multimedia

    Barberis, D

    Following the election by the ATLAS Collaboration Board of Dario Barberis (Genoa University/INFN) as Computing Coordinator and David Quarrie (LBNL) as Software Project Leader, it was considered necessary to modify the organization of the ATLAS Software & Computing ("S&C") project. The new organization is based upon the following principles: separation of the responsibilities for computing management from those of software development, with the appointment of a Computing Coordinator and a Software Project Leader who are both members of the Executive Board; hierarchical structure of responsibilities and reporting lines; coordination at all levels between TDAQ, S&C and Physics working groups; integration of the subdetector software development groups with the central S&C organization. A schematic diagram of the new organization can be seen in Fig.1. Figure 1: new ATLAS Software & Computing organization. Two Management Boards will help the Computing Coordinator and the Software Project...

  16. Software Security Requirements Gathering Instrument

    Directory of Open Access Journals (Sweden)

    Smriti Jain

    2011-08-01

    Full Text Available Security breaches are largely caused by the vulnerable software. Since individuals and organizations mostly depend on softwares, it is important to produce in secured manner. The first step towards producing secured software is through gathering security requirements. This paper describes Software Security Requirements Gathering Instrument (SSRGI that helps gather security requirements from the various stakeholders. This will guide the developers to gather security requirements along with the functional requirements and further incorporate security during other phases of software development. We subsequently present case studies that describe the integration of the SSRGI instrument with Software Requirements Specification (SRS document as specified in standard IEEE 830-1998. Proposed SSRGI will support the software developers in gathering security requirements in detail during requirements gathering phase.

  17. Modernization of software quality assurance

    Science.gov (United States)

    Bhaumik, Gokul

    1988-01-01

    The customers satisfaction depends not only on functional performance, it also depends on the quality characteristics of the software products. An examination of this quality aspect of software products will provide a clear, well defined framework for quality assurance functions, which improve the life-cycle activities of software development. Software developers must be aware of the following aspects which have been expressed by many quality experts: quality cannot be added on; the level of quality built into a program is a function of the quality attributes employed during the development process; and finally, quality must be managed. These concepts have guided our development of the following definition for a Software Quality Assurance function: Software Quality Assurance is a formal, planned approach of actions designed to evaluate the degree of an identifiable set of quality attributes present in all software systems and their products. This paper is an explanation of how this definition was developed and how it is used.

  18. Software libre vs. software propietario: programando nuestro futuro

    Directory of Open Access Journals (Sweden)

    Rafael Gómez Sánchez

    2008-12-01

    Full Text Available Este trabajo estudia la evolución de dos modelos contrapuestos: el software propietario y el software libre. Mientras el primero está plenamente establecido, y apoyado por la industria tradicional de los programas de ordenador, el software libre se presenta como una atractiva alternativa que promete corregir muchas de las deficiencias de aquel modelo. Basado en la filosofía de respetar las libertades del usuario -libertad de compartir, mejorar y utilizar los programas-, son cada vez más las administraciones, empresas y demás usuarios que optan por el software libre. La interacción entre ambos modelos y sus consecuencias, así como los intentos de las multinacionales del software por no perder mercado, serán asimismo objeto de estudio.________________________ABSTRACT:This work studies the evolution of two opposed models: propietary software and free software. Meanwhile the first one is fully established, and supported by the traditional computing industry, free software appears like an attractive alternative which promises to correct many deficiencies of that model. Based on the philosophy of respecting user’s liberties -freedom of sharing, improving and using the software-, an increasing number of administrations, companies and other users are moving to the model of free software. Interactions between both models and its consequences, as well as the attempts from the software’s multinational corporations of not to lose market, will also be objects to be studied.

  19. Applied software risk management a guide for software project managers

    CERN Document Server

    Pandian, C Ravindranath

    2006-01-01

    Few software projects are completed on time, on budget, and to their original specifications. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software Project Managers covers key components of the risk management process and the software development process, as well as best practices for software risk identification, risk planning, and risk analysis. Written in a clear and concise manner, this resource presents concepts and practical insight into managing risk. It first covers risk-driven project management, risk management processes, risk attributes, risk identification, and risk analysis. The book continues by examining responses to risk, the tracking and modeling of risks, intelligence gathering, and integrated risk management. It concludes with details on drafting and implementing procedures. A diary of a risk manager provides insight in implementing risk management processes.Bringing together concepts ...

  20. Software and Network Engineering

    CERN Document Server

    2012-01-01

    The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence – quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution - this permits a rapid and broad dissemination of research results.   The purpose of the first ACIS International Symposium on Software and Network Engineering held on Decembe...

  1. Software developments for gammasphere

    Energy Technology Data Exchange (ETDEWEB)

    Lauritsen, T.; Ahmad, I.; Carpenter, M.P. [and others

    1995-08-01

    This year marked the year when data acquisition development for Gammasphere evolved from planning to accomplishment, both in hardware and software. Two VME crates now contain about 10 crate-processors which are used to handle the data from VXI processors - which in turn collect the data from germanium and BGO detectors in the array. The signals from the detectors are processed and digitized in custom-built electronics boards. The processing power in the VME crates is used to digitally filter the data before they are written to tape. The goal is to have highly processed data flowing to tape, eliminating the off-line filtering and manipulation of data that was standard procedure in earlier experiments.

  2. Energy Tracking Software Platform

    Energy Technology Data Exchange (ETDEWEB)

    Ryan Davis; Nathan Bird; Rebecca Birx; Hal Knowles

    2011-04-04

    Acceleration has created an interactive energy tracking and visualization platform that supports decreasing electric, water, and gas usage. Homeowners have access to tools that allow them to gauge their use and track progress toward a smaller energy footprint. Real estate agents have access to consumption data, allowing for sharing a comparison with potential home buyers. Home builders have the opportunity to compare their neighborhood's energy efficiency with competitors. Home energy raters have a tool for gauging the progress of their clients after efficiency changes. And, social groups are able to help encourage members to reduce their energy bills and help their environment. EnergyIT.com is the business umbrella for all energy tracking solutions and is designed to provide information about our energy tracking software and promote sales. CompareAndConserve.com (Gainesville-Green.com) helps homeowners conserve energy through education and competition. ToolsForTenants.com helps renters factor energy usage into their housing decisions.

  3. Software Tool Issues

    Science.gov (United States)

    Hennell, Michael

    This chapter relies on experience with tool development gained over the last thirty years. It shows that there are a large number of techniques that contribute to any successful project, and that formality is always the key: a modern software test tool is based on a firm mathematical foundation. After a brief introduction, Section 2 recalls and extends the terminology of Chapter 1. Section 3 discusses the the design of different sorts of static and dynamic analysis tools. Nine important issues to be taken into consideration when evaluating such tools are presented in Section 4. Section 5 investigates the interplay between testing and proof. In Section 6, we call for developers to take their own medicine and verify their tools. Finally, we conclude in Section 7 with a summary of our main messages, emphasising the important role of testing.

  4. Assessing multizone airflow software

    Energy Technology Data Exchange (ETDEWEB)

    Lorenzetti, D.M.

    2001-12-01

    Multizone models form the basis of most computer simulations of airflow and pollutant transport in buildings. In order to promote computational efficiency, some multizone simulation programs, such as COMIS and CONTAM, restrict the form that their flow models may take. While these tools allow scientists and engineers to explore a wide range of building airflow problems, increasingly their use has led to new questions not answerable by the current generation of programs. This paper, directed at software developers working on the next generation of building airflow models, identifies structural aspects of COMIS and related programs that prevent them from easily incorporating desirable new airflow models. The paper also suggests criteria for evaluating alternate simulation environments for future modeling efforts.

  5. Software, Software Engineering and Software Engineering Research:Some Unconventional Thoughts

    Institute of Scientific and Technical Information of China (English)

    David Notkin

    2009-01-01

    Software engineering is broadly discussed as falling far short of expectations. Data and examples are used to justify how software itself is often poor, how the engineering of software leaves much to be desired, and how research in software engineering has not made enough progress to help overcome these weaknesses. However, these data and examples are presented and interpreted in ways that are arguably imbalanced. This imbalance, usually taken at face value, may be distracting the field from making significant progress towards improving the effective engineering of software, a goal the entire community shares. Research dichotomies, which tend to pit one approach against another, often subtly hint that there is a best way to engineer software or a best way to perform research on software. This, too, may be distracting the field from important classes of progress.

  6. PROMOTIONS: PROper MOTION Software

    Science.gov (United States)

    Caleb Wherry, John; Sahai, R.

    2009-05-01

    We report on the development of a software tool (PROMOTIONS) to streamline the process of measuring proper motions of material in expanding nebulae. Our tool makes use of IDL's widget programming capabilities to design a unique GUI that is used to compare images of the objects from two epochs. The software allows us to first orient and register the images to a common frame of reference and pixel scale, using field stars in each of the images. We then cross-correlate specific morphological features in order to determine their proper motions, which consist of the proper motion of the nebula as a whole (PM-neb), and expansion motions of the features relative to the center. If the central star is not visible (quite common in bipolar nebulae with dense dusty waists), point-symmetric expansion is assumed and we use the average motion of high-quality symmetric pairs of features on opposite sides of the nebular center to compute PM-neb. This is then subtracted out to determine the individual movements of these and additional features relative to the nebular center. PROMOTIONS should find wide applicability in measuring proper motions in astrophysical objects such as the expanding outflows/jets commonly seen around young and dying stars. We present first results from using PROMOTIONS to successfully measure proper motions in several pre-planetary nebulae (transition objects between the red giant and planetary nebula phases), using images taken 7-10 years apart with the WFPC2 and ACS instruments on board HST. The authors are grateful to NASA's Undergradute Scholars Research Program (USRP) for supporting this research.

  7. Evolvable Neural Software System

    Science.gov (United States)

    Curtis, Steven A.

    2009-01-01

    The Evolvable Neural Software System (ENSS) is composed of sets of Neural Basis Functions (NBFs), which can be totally autonomously created and removed according to the changing needs and requirements of the software system. The resulting structure is both hierarchical and self-similar in that a given set of NBFs may have a ruler NBF, which in turn communicates with other sets of NBFs. These sets of NBFs may function as nodes to a ruler node, which are also NBF constructs. In this manner, the synthetic neural system can exhibit the complexity, three-dimensional connectivity, and adaptability of biological neural systems. An added advantage of ENSS over a natural neural system is its ability to modify its core genetic code in response to environmental changes as reflected in needs and requirements. The neural system is fully adaptive and evolvable and is trainable before release. It continues to rewire itself while on the job. The NBF is a unique, bilevel intelligence neural system composed of a higher-level heuristic neural system (HNS) and a lower-level, autonomic neural system (ANS). Taken together, the HNS and the ANS give each NBF the complete capabilities of a biological neural system to match sensory inputs to actions. Another feature of the NBF is the Evolvable Neural Interface (ENI), which links the HNS and ANS. The ENI solves the interface problem between these two systems by actively adapting and evolving from a primitive initial state (a Neural Thread) to a complicated, operational ENI and successfully adapting to a training sequence of sensory input. This simulates the adaptation of a biological neural system in a developmental phase. Within the greater multi-NBF and multi-node ENSS, self-similar ENI s provide the basis for inter-NBF and inter-node connectivity.

  8. Software Based Supernova Recognition

    Science.gov (United States)

    Walters, Stephen M.

    2014-05-01

    This paper describes software for detecting Supernova (SN) in images. The software can operate in real-time to discover SN while data is being collected so the instrumentation can immediately be re-tasked to perform spectroscopy or photometry of a discovery. Because the instrumentation captures two images per minute, the realtime budget is constrained to 30 seconds per target, a challenging goal. Using a set of two to four images, the program creates a "Reference" (REF) image and a "New" (NEW) image where all images are used in both NEW and REF but any SN survives the combination process only in the NEW image. This process produces good quality images having similar noise characteristics but without artifacts that might be interpreted as SN. The images are then adjusted for seeing and brightness differences using a variant of Tomaney and Crotts method of Point Spread Function (PSF) matching after which REF is subtracted from NEW to produce a Difference (DIF) image. A Classifier is then trained on a grid of artificial SN to estimate the statistical properties of four attributes and used in a process to mask false positives that can be clearly identified as such. Further training to avoid any remaining false positives sets the range, in standard deviations for each attribute, that the Classifier will accept as a valid SN. This training enables the Classifier to discriminate between SN and most subtraction residue. Lastly, the DIF image is scanned and measured by the Classifier to find locations where all four properties fall within their acceptance ranges. If multiple locations are found, the one best conforming to the training estimates is chosen. This location is then declared as a Candidate SN, the instrumentation re-tasked and the operator notified.

  9. FOSER - Future of Software Engineering Research

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The 2010 Report of the Presidents Council of Advisors on Science and Technology PCAST, entitled ?Designing a Digital Future: Federally Funded Research and...

  10. Software Reliability through Theorem Proving

    Directory of Open Access Journals (Sweden)

    S.G.K. Murthy

    2009-05-01

    Full Text Available Improving software reliability of mission-critical systems is widely recognised as one of the major challenges. Early detection of errors in software requirements, designs and implementation, need rigorous verification and validation techniques. Several techniques comprising static and dynamic testing approaches are used to improve reliability of mission critical software; however it is hard to balance development time and budget with software reliability. Particularly using dynamic testing techniques, it is hard to ensure software reliability, as exhaustive testing is not possible. On the other hand, formal verification techniques utilise mathematical logic to prove correctness of the software based on given specifications, which in turn improves the reliability of the software. Theorem proving is a powerful formal verification technique that enhances the software reliability for missioncritical aerospace applications. This paper discusses the issues related to software reliability and theorem proving used to enhance software reliability through formal verification technique, based on the experiences with STeP tool, using the conventional and internationally accepted methodologies, models, theorem proving techniques available in the tool without proposing a new model.Defence Science Journal, 2009, 59(3, pp.314-317, DOI:http://dx.doi.org/10.14429/dsj.59.1527

  11. The relationships between software publications and software systems

    Science.gov (United States)

    Hogg, David W.

    2017-01-01

    When we build software systems or software tools for astronomy, we sometimes do and sometimes don't also write and publish standard scientific papers about those software systems. I will discuss the pros and cons of writing such publications. There are impacts of writing such papers immediately (they can affect the design and structure of the software project itself), in the short term (they can promote adoption and legitimize the software), in the medium term (they can provide a platform for all the literature's mechanisms for citation, criticism, and reuse), and in the long term (they can preserve ideas that are embodied in the software, possibly on timescales much longer than the lifetime of any software context). I will argue that as important as pure software contributions are to astronomy—and I am both a preacher and a practitioner—software contributions are even more valuable when they are associated with traditional scientific publications. There are exceptions and complexities of course, which I will discuss.

  12. MINIMIZATION OF RETRIEVAL TIME DURING SOFTWARE REUSE ...

    African Journals Online (AJOL)

    eobe

    Software reuse refers to the development of software using. Software ... software development time and overall cost. Retrieval of ... Nigerian Journal of Technology (NIJOTECH). Vol. 34 No. ..... SourceForge, a popular web-based source code.

  13. Software engineering beyond the project

    DEFF Research Database (Denmark)

    Dittrich, Yvonne

    2014-01-01

    Context The main part of software engineering methods, tools and technologies has developed around projects as the central organisational form of software development. A project organisation depends on clear bounds regarding scope, participants, development effort and lead-time. What happens when...... these conditions are not given? The article claims that this is the case for software product specific ecosystems. As software is increasingly developed, adopted and deployed in the form of customisable and configurable products, software engineering as a discipline needs to take on the challenge to support...... of traditional software engineering, but makes perfect sense, considering that the frame of reference for product development is not a project but continuous innovation across the respective ecosystem. The article provides a number of concrete points for further research....

  14. Modular Software-Defined Radio

    Directory of Open Access Journals (Sweden)

    Rhiemeier Arnd-Ragnar

    2005-01-01

    Full Text Available In view of the technical and commercial boundary conditions for software-defined radio (SDR, it is suggestive to reconsider the concept anew from an unconventional point of view. The organizational principles of signal processing (rather than the signal processing algorithms themselves are the main focus of this work on modular software-defined radio. Modularity and flexibility are just two key characteristics of the SDR environment which extend smoothly into the modeling of hardware and software. In particular, the proposed model of signal processing software includes irregular, connected, directed, acyclic graphs with random node weights and random edges. Several approaches for mapping such software to a given hardware are discussed. Taking into account previous findings as well as new results from system simulations presented here, the paper finally concludes with the utility of pipelining as a general design guideline for modular software-defined radio.

  15. SOFTWARE RELIABILITY OF PROFICIENT ENACTMENT

    Directory of Open Access Journals (Sweden)

    B.Anni Princy

    2014-07-01

    Full Text Available A software reliability exemplary projects snags the random process as disillusionments which were the culmination yield of two progressions: emerging faults and initial state values. The predominant classification uses the logistic analysis effort function mounting efficient software on the real time dataset. The detriments of the logistic testing were efficaciously overcome by Pareto distribution. The estimated outline ventures the resolved technique for analyzing the suitable communities and the preeminent of fit for a software reliability progress model. Its constraints are predictable to evaluate the reliability of a software system. The future process will permit for software reliability estimations that can be used both as prominence Indicator, but also for planning and controlling resources, the development times based on the onslaught assignments of the efficient computing and reliable measurement of a software system was competent.

  16. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  17. Recommendation systems in software engineering

    CERN Document Server

    Robillard, Martin P; Walker, Robert J; Zimmermann, Thomas

    2014-01-01

    With the growth of public and private data stores and the emergence of off-the-shelf data-mining technology, recommendation systems have emerged that specifically address the unique challenges of navigating and interpreting software engineering data.This book collects, structures and formalizes knowledge on recommendation systems in software engineering. It adopts a pragmatic approach with an explicit focus on system design, implementation, and evaluation. The book is divided into three parts: "Part I - Techniques" introduces basics for building recommenders in software engineering, including techniques for collecting and processing software engineering data, but also for presenting recommendations to users as part of their workflow.?"Part II - Evaluation" summarizes methods and experimental designs for evaluating recommendations in software engineering.?"Part III - Applications" describes needs, issues and solution concepts involved in entire recommendation systems for specific software engineering tasks, fo...

  18. Software Development Cost Estimation Methods

    Directory of Open Access Journals (Sweden)

    Bogdan Stepien

    2003-01-01

    Full Text Available Early estimation of project size and completion time is essential for successful project planning and tracking. Multiple methods have been proposed to estimate software size and cost parameters. Suitability of the estimation methods depends on many factors like software application domain, product complexity, availability of historical data, team expertise etc. Most common and widely used estimation techniques are described and analyzed. Current research trends in software estimation cost are also presented.

  19. UTM TCL2 Software Requirements

    Science.gov (United States)

    Smith, Irene S.; Rios, Joseph L.; McGuirk, Patrick O.; Mulfinger, Daniel G.; Venkatesan, Priya; Smith, David R.; Baskaran, Vijayakumar; Wang, Leo

    2017-01-01

    The Unmanned Aircraft Systems (UAS) Traffic Management (UTM) Technical Capability Level (TCL) 2 software implements the UTM TCL 2 software requirements described herein. These software requirements are linked to the higher level UTM TCL 2 System Requirements. Each successive TCL implements additional UTM functionality, enabling additional use cases. TCL 2 demonstrated how to enable expanded multiple operations by implementing automation for beyond visual line-of-sight, tracking operations, and operations flying over sparsely populated areas.

  20. Software package requirements and procurement

    OpenAIRE

    1996-01-01

    This paper outlines the problems of specifying requirements and deploying these requirements in the procurement of software packages. Despite the fact that software construction de novo is the exception rather than the rule, little or no support for the task of formulating requirements to support assessment and selection among existing software packages has been developed. We analyse the problems arising in this process and review related work. We outline the key components of a programme of ...