66,124 research outputs found

    An assessment of systems and software engineering scholars and institutions (2000-2004)

    Get PDF
    This paper presents the findings of a five-year study of the top scholars and institutions in the Systems and Software Engineering field, as measured by the quantity of papers published in the journals of the field in 2000-2004. The top scholar is Hai Zhuge of the Chinese Academy of Sciences, and the top institution is Korea Advanced Institute of Science and Technology. This paper is part of an ongoing study, conducted annually, that identifies the top 15 scholars and institutions in the most recent five-year period. © 2005 Elsevier Inc. All rights reserved.link_to_subscribed_fulltex

    Developing the Curriculum for Collaborative Intellectual Property Education

    Get PDF
    Intellectual property education, i.e. how intellectual property should be taught or more importantly how intellectual property is learnt, is a recent addition to the academic 'intellectual property' agenda. The regulation, acquisition and management of intellectual property rights presents economic, ethical, social and policy challenges across the international academic and business communities. Intellectual property is also the starting point of interesting academic cross-disciplinary collaborations in learning and teaching and in research. It will probably always be primarily a law subject taught by lawyers to law students hoping to practice. At the same time there is a growing array of disciplines demanding an awareness of and a competence in handling intellectual property concepts and regulations. At Bournemouth, we have been teaching IP across the disciplines for more than a decade. Recently, the Higher Education Academy subject centres in Law and in Engineering jointly funded a project to research 'IP for Engineers'. WIPO has begun addressing IP Education in earnest. At an international symposium in July 2005, papers addressed different aspects of IP Education, including Collaboration between Law Faculties and other disciplines. In November 2005, they jointly sponsored a National Conference in China to consider IP Education from primary school thru postgraduate research. IP education beyond the law school raises interesting questions for anyone contemplating teaching this complex law subject to non-lawyers. What constitutes the IP syllabus? Who should be teaching IP? When should it be taught? How should it be taught? What resources should be available? This paper begins to explore some of the answers

    An assessment of systems and software engineering scholars and institutions (2001-2005)

    Get PDF
    This paper presents the findings of a five-year study of the top scholars and institutions in the systems and software engineering field, as measured by the quantity of papers published in the journals of the field in 2001-2005. The top scholar is Magne Jørgensen of Simula Research Laboratory, Norway, and the top institution is Korea Advanced Institute of Science and Technology, Korea. This paper is part of an ongoing study, conducted annually, that identifies the top 15 scholars and institutions in the most recent five-year period. © 2007 Elsevier Inc. All rights reserved.postprin

    An assessment of systems and software engineering scholars and institutions (2002-2006)

    Get PDF
    This paper summarizes a survey of publications in the field of systems and software engineering from 2002 to 2006. The survey is an ongoing, annual event that identifies the top 15 scholars and institutions over a 5-year period. The rankings are calculated based on the number of papers published in TSE, TOSEM, JSS, SPE, EMSE, IST, and Software. The top-ranked institution is Korea Advanced Institute of Science and Technology, Korea, and the top-ranked scholar is Magne Jørgensen of Simula Research Laboratory, Norway. © 2009 Elsevier Inc. All rights reserved.postprin

    Nanotechnology Publications and Patents: A Review of Social Science Studies and Search Strategies

    Get PDF
    This paper provides a comprehensive review of more than 120 social science studies in nanoscience and technology, all of which analyze publication and patent data. We conduct a comparative analysis of bibliometric search strategies that these studies use to harvest publication and patent data related to nanoscience and technology. We implement these strategies on 2006 publication data and find that Mogoutov and Kahane (2007), with their evolutionary lexical query search strategy, extract the highest number of records from the Web of Science. The strategies of Glanzel et al. (2003), Noyons et al. (2003), Porter et al. (2008) and Mogoutov and Kahane (2007) produce very similar ranking tables of the top ten nanotechnology subject areas and the top ten most prolific countries and institutions.nanotechnology, research and development, productivity, publications, patents, bibliometric analysis, search strategy

    Critique of Architectures for Long-Term Digital Preservation

    Get PDF
    Evolving technology and fading human memory threaten the long-term intelligibility of many kinds of documents. Furthermore, some records are susceptible to improper alterations that make them untrustworthy. Trusted Digital Repositories (TDRs) and Trustworthy Digital Objects (TDOs) seem to be the only broadly applicable digital preservation methodologies proposed. We argue that the TDR approach has shortfalls as a method for long-term digital preservation of sensitive information. Comparison of TDR and TDO methodologies suggests differentiating near-term preservation measures from what is needed for the long term. TDO methodology addresses these needs, providing for making digital documents durably intelligible. It uses EDP standards for a few file formats and XML structures for text documents. For other information formats, intelligibility is assured by using a virtual computer. To protect sensitive information—content whose inappropriate alteration might mislead its readers, the integrity and authenticity of each TDO is made testable by embedded public-key cryptographic message digests and signatures. Key authenticity is protected recursively in a social hierarchy. The proper focus for long-term preservation technology is signed packages that each combine a record collection with its metadata and that also bind context—Trustworthy Digital Objects.
    corecore