35 research outputs found
Language-Driven Engineering An Interdisciplinary Software Development Paradigm
We illustrate how purpose-specific, graphical modeling enables application
experts with different levels of expertise to collaboratively design and then
produce complex applications using their individual, purpose-specific modeling
language. Our illustration includes seven graphical Integrated Modeling
Environments (IMEs) that support full code generation, as well as four
browser-based applications that were modeled and then fully automatically
generated and produced using DIME, our most complex graphical IME. While the
seven IMEs were chosen to illustrate the types of languages we support with our
Language-Driven Engineering (LDE) approach, the four DIME products were chosen
to give an impression of the power of our LDE-generated IMEs. In fact,
Equinocs, Springer Nature's future editorial system for proceedings, is also
being fully automatically generated and then deployed at their Dordrecht site
using a deployment pipeline generated with Rig, one of the IMEs presented. Our
technology is open source and the products presented are currently in use.Comment: 43 pages, 30 figure
Principles of Security and Trust
This open access book constitutes the proceedings of the 8th International Conference on Principles of Security and Trust, POST 2019, which took place in Prague, Czech Republic, in April 2019, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2019. The 10 papers presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and foundational aspects of security and trust, including on new theoretical results, practical applications of existing foundational ideas, and innovative approaches stimulated by pressing practical problems
Coastal cities at risk in the Philippines (CCARPH) : investing in climate and disaster resilience project : technical report for years 1-3
The project worked to increase capacity of coastal cities and vulnerable communities in the Philippines to adapt to climate and disaster risks, and move towards resilience in the context of rapid urbanization and economic expansion. Advocating for science-based decision-making, and operating through public-private transdisciplinary collaboration, coastal cities at risk in the Philippines (CCARPH) along with the National Resilience Council (NRC) helped integrate private sector roles in understanding, mitigating, and preventing risks associated with climate change. The report covers project activities, strategic partnerships, outputs and outcomes, with embedded links to websites, publications, policy briefs and innovative approaches
An exploration of the impact of corruption on service delivery in the Emfuleni Local Municipality, Gauteng
This study was conducted as a result of the various media reports and complaints from the Emfuleni Local Municipality residents on the impact of corruption on service delivery in the Emfuleni local municipality. The municipality does not have any strategy to fight corruption and it only relies on the South African Police Service (SAPS) to investigate internal crimes. A qualitative research approach was used to investigate this problem. A thorough literature study and documentary analysis were used to gather the relevant data related to this topic.Criminology and Security ScienceM.A. (Forensic Science and Technology
Genres of Listening
Xochitl Marsilli-Vargas explains how psychoanalytic listening practices have expanded beyond the clinical setting to influence everyday social interactions in Buenos Aires
Genres of Listening
Xochitl Marsilli-Vargas explains how psychoanalytic listening practices have expanded beyond the clinical setting to influence everyday social interactions in Buenos Aires
Principles of Security and Trust: 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings
authentication; computer science; computer software selection and evaluation; cryptography; data privacy; formal logic; formal methods; formal specification; internet; privacy; program compilers; programming languages; security analysis; security systems; semantics; separation logic; software engineering; specifications; verification; world wide we