1,558 research outputs found

    Historical roots of Agile methods: where did “Agile thinking” come from?

    No full text
    The appearance of Agile methods has been the most noticeable change to software process thinking in the last fifteen years [16], but in fact many of the “Agile ideas” have been around since 70’s or even before. Many studies and reviews have been conducted about Agile methods which ascribe their emergence as a reaction against traditional methods. In this paper, we argue that although Agile methods are new as a whole, they have strong roots in the history of software engineering. In addition to the iterative and incremental approaches that have been in use since 1957 [21], people who criticised the traditional methods suggested alternative approaches which were actually Agile ideas such as the response to change, customer involvement, and working software over documentation. The authors of this paper believe that education about the history of Agile thinking will help to develop better understanding as well as promoting the use of Agile methods. We therefore present and discuss the reasons behind the development and introduction of Agile methods, as a reaction to traditional methods, as a result of people's experience, and in particular focusing on reusing ideas from histor

    Gender, war and militarism: making and questioning the links

    Get PDF
    The gender dynamics of militarism have traditionally been seen as straightforward, given the cultural mythologies of warfare and the disciplining of ‘masculinity’ that occurs in the training and use of men's capacity for violence in the armed services. However, women's relation to both war and peace has been varied and complex. It is women who have often been most prominent in working for peace, although there are no necessary links between women and opposition to militarism. In addition, more women than ever are serving in many of today's armies, with feminists rather uncertain on how to relate to this phenomenon. In this article, I explore some of the complexities of applying gender analyses to militarism and peace work in sites of conflict today, looking most closely at the Israeli feminist group, New Profile, and their insistence upon the costs of the militarized nature of Israeli society. They expose the very permeable boundaries between the military and civil society, as violence seeps into the fears and practices of everyday life in Israel. I place their work in the context of broader feminist analysis offered by researchers such as Cynthia Enloe and Cynthia Cockburn, who have for decades been writing about the ‘masculinist’ postures and practices of warfare, as well as the situation of women caught up in them. Finally, I suggest that rethinking the gendered nature of warfare must also encompass the costs of war to men, whose fundamental vulnerability to psychological abuse and physical injury is often downplayed, whether in mainstream accounts of warfare or in more specific gender analysis. Feminists need to pay careful attention to masculinity and its fragmentations in addressing the topic of gender, war and militarism

    Empirically Driven Use Case Metamodel Evolution

    Get PDF
    Metamodel evolution is rarely driven by empirical evidences of metamodel drawbacks. In this paper, the evolution of the use case metamodel used by the publicly available requirements management tool REM is presented. This evolution has been driven by the analysis of empirical data obtained during the assessment of several metrics–based verification heuristics for use cases developed by some of the authors and previously presented in other international fora. The empirical analysis has made evident that some common defects found in use cases developed by software engineering students were caused not only by their lack of experience but also by the expressive limitations imposed by the underlying use case metamodel used in REM. Once these limitations were clearly identified, a number of evolutionary changes were proposed to the REM use case metamodel in order to increase use case quality, i.e. to avoid those situations in which the metamodel were the cause of defects in use case specifications.Ministerio de Ciencia y Tecnología TIC 2003-02737-C02-0

    A posteriori error analysis and adaptive non-intrusive numerical schemes for systems of random conservation laws

    Full text link
    In this article we consider one-dimensional random systems of hyperbolic conservation laws. We first establish existence and uniqueness of random entropy admissible solutions for initial value problems of conservation laws which involve random initial data and random flux functions. Based on these results we present an a posteriori error analysis for a numerical approximation of the random entropy admissible solution. For the stochastic discretization, we consider a non-intrusive approach, the Stochastic Collocation method. The spatio-temporal discretization relies on the Runge--Kutta Discontinuous Galerkin method. We derive the a posteriori estimator using continuous reconstructions of the discrete solution. Combined with the relative entropy stability framework this yields computable error bounds for the entire space-stochastic discretization error. The estimator admits a splitting into a stochastic and a deterministic (space-time) part, allowing for a novel residual-based space-stochastic adaptive mesh refinement algorithm. We conclude with various numerical examples investigating the scaling properties of the residuals and illustrating the efficiency of the proposed adaptive algorithm

    hp-DGFEM for Partial Differential Equations with Nonnegative Characteristic Form

    Get PDF
    Presented as Invited Lecture at the International Symposium on Discontinuous Galerkin Methods: Theory, Computation and Applications, in Newport, RI, USA.\ud \ud We develop the error analysis for the hp-version of a discontinuous finite element approximation to second-order partial differential equations with nonnegative characteristic form. This class of equations includes classical examples of second-order elliptic and parabolic equations, first-order hyperbolic equations, as well as equations of mixed type. We establish an a priori error bound for the method which is of optimal order in the mesh size h and 1 order less than optimal in the polynomial degree p. In the particular case of a first-order hyperbolic equation the error bound is optimal in h and 1/2 an order less than optimal in p

    A combination of cherry juice and cold water immersion does not enhance marathon recovery compared to either treatment in isolation: a randomized placebo-controlled trial

    Get PDF
    Purpose: Cherry juice (CJ) and cold water immersion (CWI) are both effective recovery strategies following strenuous endurance exercise. However, athletes routinely combine recovery interventions and less is known about the impact of a combined CJ and CWI protocol. Therefore, this study investigated the effects of combining CWI and CJ (a “cocktail” (CT)) on inflammation and muscle damage following a marathon. Methods: A total 39 endurance trained males were randomly assigned to a placebo (PL), CWI, CJ, or CT group before completing a trail marathon run. Muscle damage (creatine kinase (CK)), muscle function (maximal voluntary isometric contraction (MVIC)), and inflammation (interleukin-6 (IL-6); C-reactive protein (CRP)) were measured at baseline, immediately after marathon (only IL-6), 24 h, and 48 h after marathon. Results: There were no statistically significant differences between groups and no group × time interaction effects for any of the dependent variables. Confidence intervals (CI) illustrated that CT had unclear effects on inflammation (IL-6; CRP) and MVIC, but may have increased CK to a greater extent than PL and CJ conditions. Conclusion: There is no evidence of an additive effect of CJ and CWI when the treatments are used in conjunction with each other. On the contrary, combining CJ and CWI may result in slightly increased circulating CK

    Finding and Resolving Security Misusability with Misusability Cases

    Get PDF
    Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice- versa. One way of using scenarios to bridge security and usability involves explicitly describing how design deci- sions can lead to users inadvertently exploiting vulnera- bilities to carry out their production tasks. This paper describes how misusability cases, scenarios that describe how design decisions may lead to usability problems sub- sequently leading to system misuse, address this problem. We describe the related work upon which misusability cases are based before presenting the approach, and illus- trating its application using a case study example. Finally, we describe some findings from this approach that further inform the design of usable and secure systems

    Work restructuring and changing craft identity: the Tale of the Disaffected Weavers (or what happens when the rug is pulled from under your feet)

    Get PDF
    This article explores the changes in worker identity that can occur during manufacturing restructuring – specifically those linked to the declining status of craft work – through an in-depth case study of Weaveco, a UK carpet manufacturer. An analysis of changes in the labour process is followed by employee reactions centred on the demise of the traditional craft identity of male carpet weavers. The voices of the weavers dramatize the tensions involved in reconstructing their masculine identity, and we consider the implications this has for understanding gendered work relations

    Empirical Investigation on Agile Methods Usage: Issues Identified from Early Adopters in Malaysia

    Get PDF
    Agile Methods are a set of software practices that can help to produce products faster and at the same time deliver what customers want. Despite the benefits that Agile methods can deliver, however, we found few studies from the Southeast Asia region, particularly Malaysia. As a result, less empirical evidence can be obtained in the country making its implementation harder. To use a new method, experience from other practitioners is critical, which describes what is important, what is possible and what is not possible concerning Agile. We conducted a qualitative study to understand the issues faced by early adopters in Malaysia where Agile methods are still relatively new. The initial study involves 13 participants including project managers, CEOs, founders and software developers from seven organisations. Our study has shown that social and human aspects are important when using Agile methods. While technical aspects have always been considered to exist in software development, we found these factors to be less important when using Agile methods. The results obtained can serve as guidelines to practitioners in the country and the neighbouring regions
    corecore