Papers by Stephen Seidman
... The study of software architectural styles is still in its infancy. The first papers from Gar... more ... The study of software architectural styles is still in its infancy. The first papers from Garlan's group dealt with only a few rather general styles: the pipes and filters commonly used in Unix; the client-server style; and an object-oriented style ([SG], [G2], [GAO]). ...
This paper shows how Z can be used as a substrate for an architectural style description language... more This paper shows how Z can be used as a substrate for an architectural style description language. The language provides a collection of abstract software types that support the description of execution and interface semantics, logical views, and relationships between logical views. The software types correspond to application-invariant Z schemas, which provide a type-theoretic basis for the language that allows it to be used for describing, analyzing, and comparing various architectural styles and logical views.
2011 24th IEEE-CS Conference on Software Engineering Education and Training (CSEE&T), 2011
Software Engineering graduates are expected to enter the workforce with both technical and soft s... more Software Engineering graduates are expected to enter the workforce with both technical and soft skills. In addition, software quality is a topic that is becoming increasingly important both because of educational and industry requirements. Software engineering lecturers need to bring their research into the classroom. Bringing all of these together can pose the lecturer with a dilemma that is not
Proceedings of the third international workshop on Software architecture - ISAW '98, 1998
ACM SIGCSE Bulletin, 2005
After four decades of research on a broad range of topics, computing education has now emerged as... more After four decades of research on a broad range of topics, computing education has now emerged as a mature research community, with its own journals, conferences, and monographs. Despite this success, the computing education research community still lacks a commonly recognized core literature. A core literature can help a research community to develop a common orientation and make it easier for new researchers to enter the community. This paper proposes an approach to constructing and maintaining a core literature for computing education research. It includes a model for classifying research contributions and a methodology for determining whether they should be included in the core. The model and methodology have been applied to produce an initial list of core papers. An annotated list of these papers is given in appendix A.
... There are many graph-theoretic results similar in form and content to Monger's theor... more ... There are many graph-theoretic results similar in form and content to Monger's theorem, and the fact that the k-plex result that led us to Menger's theorem dealt not with ... Lovasz, L., V. Neumann-Lara and M. Plummcr 1978 "Mengerian theorems for paths of bounded length". ...
Journal of Mathematical Sociology, 1978
For at least twenty‐five years, the concept of the clique has had a prominent place in sociometri... more For at least twenty‐five years, the concept of the clique has had a prominent place in sociometric and other kinds of sociological research. Recently, with the advent of large, fast computers and with the growth of interest in graph‐theoretic social network studies, research on the definition and investigation of the graph theoretic properties of clique‐like structures has grown. In the
IEEE Computer Society Real-World Software Engineering Problems helps prepare software engineering... more IEEE Computer Society Real-World Software Engineering Problems helps prepare software engineering professionals for the IEEE Computer Society Certified Software Development Professional (CSDP) Certification Program. The book offers workable, real-world sample problems ...
The term software architectural style has recently been introduced to refer to theconventions tha... more The term software architectural style has recently been introduced to refer to theconventions that are used to interpret a description of a software architecture. The representationand analysis of useful architectural styles is an important problem. This paper gives an overviewof a methodology developed by the authors for describing the syntax and semantics of softwarearchitectural styles with an application to the US Naval Research Laboratory's Processing GraphMethod (PGM). This...
Social Networks, 1978
... There are many graph-theoretic results similar in form and content to Monger's theor... more ... There are many graph-theoretic results similar in form and content to Monger's theorem, and the fact that the k-plex result that led us to Menger's theorem dealt not with ... Lovasz, L., V. Neumann-Lara and M. Plummcr 1978 "Mengerian theorems for paths of bounded length". ...
Sexualities, 1999
Abstract Drawing on interviews, this article rethinks both the core ideas of gay culture and the ... more Abstract Drawing on interviews, this article rethinks both the core ideas of gay culture and the contemporary texture of gay life. We argue that the categories of the closet, coming out, and a primary gay identity are linked to specific historical conditions. Specifically, the lives of ...
Journal of Parallel and Distributed Computing, 1990
ABSTRACT
Journal of Consumer Research, 1984
Page 1. Brand Congruence in Interpersonal Relations: A Social Network Analysis PETER H. REINGEN B... more Page 1. Brand Congruence in Interpersonal Relations: A Social Network Analysis PETER H. REINGEN BRIAN L. FOSTER JACQUELINE JOHNSON BROWN STEPHEN B. SEIDMAN* Previous studies dealing with the notion ...
Engineering of Computer-Based Systems, 2000
This paper describes and specifies architectural features of an industrial distributed measuremen... more This paper describes and specifies architectural features of an industrial distributed measurement system, using two architectural description languages (ADLs). A discussion of the advantages and disadvantages of the ADLs is given
International Journal of Man-Machine Studies, 1988
In this paper we analyse a connectionist model of information processing in which the spread of a... more In this paper we analyse a connectionist model of information processing in which the spread of activity in the network is controlled by the nodes actively competing for available activation. This model meets the needs of various artificiaMntelligence tasks and has demonstrated several useful properties, including circumscribed spread of activation, stability of network activation following termination of external influences, and context-sensitive "winner-take-all" phenomena without explicit inhibitory links between nodes representing mutually exclusive concepts. We examine three instances of the competition-based connectionist model. For each instance, we show that the differential equations modelling the changes in the activation level of each node has a solution, and we prove that given any initial activity values of the nodes, certain equilibrium activation levels are reached. In particular, we demonstrate that lateral inhibition, i.e. mutually exclusive activity for nodes in the same layer, is possible without explicitly including links between nodes in the same layer. We believe that our results for these instances of the model give important insights into the behaviour observed in the general model. 78 P, Y. WANG ET AL.
IEEE Transactions on Software Engineering, 1994
The user has requested enhancement of the downloaded file.
The user has requested enhancement of the downloaded file.
... applicability of software engineering knowledge [10], which indicates a larger gap between tr... more ... applicability of software engineering knowledge [10], which indicates a larger gap between transferred knowledge ... Another unexpected result of the subjective assessment was that alumni have a ... while retaining large stores of domain knowledge held by the existing employees. ...
American Ethnologist, 1981
Two closely related but distinct ideas seem to motivate recent social science interest in social ... more Two closely related but distinct ideas seem to motivate recent social science interest in social networks. First, and most important, there i s widespread agreement that configurations of the social networks in which individuals find themselves place extremely heavy constraints on social action or, alternatively, provide important social resources for individuals in their social action. For example, the success of certain kinds of business activities, the ability to accomplish certain productive tasks, and the chance of forming certain kinds of political alliances all depend on properties of the social networks in which they are carried out.
Uploads
Papers by Stephen Seidman