منابع مشابه
Inbreeding in Software Engineering Conferences
A cornerstone of research is publishing: important research results must be made generally available for the research community, so that existing research can be exploited in new research and the community can share a common understanding of the research area. However, publishing is increasingly used as a basis of measuring the productivity of researchers and research institutes as well. This, ...
متن کاملHow healthy are software engineering conferences?
In this article we study the health of software engineering conferences by means of a suite of metrics created for this purpose. The metrics measure stability of the community, openness to new authors, introversion, representativeness of the PC with respect to the authors’ community, availability of PC candidates, and scientific prestige. Using this metrics suite, we assess the health of 11 sof...
متن کاملRequirements Engineering Conferences: Wither Industry Tracks? Unabridged Version With a Track History of the RE Conferences
This report argues that industry tracks have no place in any research conference. Instead, a research conference should always have room for industrial case studies, evaluated according to criteria for empirical research. Such case studies would not be acceptable at a practitioners’ industrial conference, just as papers presented at such conferences would not be acceptable at research conferenc...
متن کاملTeaching Engineering Ethics
There is general agreement that engineering students should receive ethics instruction as a part of their undergraduate education. However, there are diverse opinions on how engineering ethics instruction should be carried out. Philosophy of ethics, the original approach, emphasizes normative ideals and abstract principles. The new case studies approach focuses on a number of real and hypotheti...
متن کاملTeaching Security Engineering Principles
The design and construction of secure systems cannot be entirely captured in textbooks or class notes, but must be taught as an art which is learned through apprenticeship and practice. This paper describes a course in Secure Systems that uses the Flaw Hypothesis Methodology for penetration testing as a vehicle for motivating and teaching students fundamental principles of security
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the Canadian Engineering Education Association (CEEA)
سال: 2018
ISSN: 2371-5243
DOI: 10.24908/pceea.v0i0.9558