Our confidence in software systems depends on our confidence in the exhaustiveness of our testing. As software systems get more complex, the task of exhaustive testing becomes more complex and even infeasible in some cases. In order to build less error prone systems, we therefore need to not only focus...
Open source software has become a powerful force in the world of computing. While once confined to the domain of technical specialists, people of all types have begun to adopt this software – from the casual web-surfer who uses Firefox, to the professional web developer who codes in PHP or...
Over the past few decades, the ratio of women to men in many traditionally maledominated fields has become much more equal. However, in science, technology, engineering, and math (STEM) fields the ratio has not improved at the same rate. In computer science the ratio is still very uneven. Today women...
Due to the interdependent nature of Free Open Source Software projects, a vulnerability in just one highly used project can have significant and sweeping consequences across many projects, and can inflict hundreds of millions of dollars in damage. This paper proposes a model for predicting software vulnerabilities in highly used...
:
______________________________________________________________________________
CarlosJensen
Due to the interdependent nature of Free Open Source Software projects
Free / Open Source Software developers come from a myriad of different backgrounds. While some contribute for personal reasons, many become involved because they receive compensation from corporations or foundations. The motivation for participating in a project can have dramatic impacts on how and what contribution an individual makes. These...
In order to support first-year women in engineering, a program was designed to help their transition to college and promote connection with other women. The program focused on three main areas based in research: mentor matching with mentee input, regular formal meetings in small mentoring groups, and the formation of...
While there are powerful keyword search systems that index all kinds of resources including emails and web pages, people have trouble recalling semantic facts such as the name, location, edit dates and keywords that uniquely identifies resources in their personal repositories. Reusing information exasperates this problem. A rarely used approach...
The Internet is growing rapidly in terms of websites, users and uses. People use the Internet for reference, shopping, social networking, communications, business and much more. Though the Internet is useful, there are many risks associated with its use, like malicious websites, identity theft, hateful content and fraudulent practices. Online...
Free/Open Source Software (FOSS) communities often use open bug reporting to allow users to participate by reporting bugs. This practice can lead to more duplicate reports, as inexperienced users can be less rigorous about researching existing bug reports. The purpose of this research is to determine the extent of this...
Collaboration is tricky, but often beneficial in the context of numerous software related activities, from learning core concepts, to the design and implementation of large software products. The growth of online classes, from small structured seminars to massive open online courses (MOOCs), and the isolation and impoverished learning experience some...