The document discusses expectations and responsibilities for academics at different career stages, from postdoc to full professor. It notes that the typical workload expectations are 40-50% research, 30-40% teaching, and 10-30% service. Service responsibilities increase over time and include organizing scientific conferences. Organizing a conference requires gaining experience with established conferences, building a team, making strategic decisions around formats and policies, and learning from mistakes. Conflicts of interest policies aim to ensure fair and unbiased review processes.
Publishing Ada: A Retrospective Look at the First Three Years of an Open Peer...Karen Estlund
Presentation by: Karen Estlund, Sarah Hamid, and Bryce Peake
At the CNI spring 2012 meeting, we presented on a new collaborative journal publishing project from The Fembot Collective and the University of Oregon (UO) Libraries, Ada: A Journal of Gender, New Media, and Technology. The Fembot Collective is a collaborative of feminist media scholars, producers, and artists engaged with the intersection of new media and technology and scholarly communication. One aspiration of this project was to reclaim the means of scholarly production through a community-centered model of open peer review and multi-modal publication processes. As a work in progress, Ada has continuously evolved to meet the needs of diverse authors, readers, and commentators. In the face of changing scholarly communication practices, the Fembot and library collaboration offers an alternative system of open-access publication and review that recaptures academic production structures in favor of cross-disciplinary, multi-modal, collaborative knowledge. Our community standards state that “responding is political work” emphasizing a space that demands constant redirection and active participation by its collaborators in order to generate new expressions of feminist open access scholarship over time. Now in our third year of publication and working on our ninth issue, we will review lessons learned about audience, production, infrastructure, design and assessment. We will discuss the ways in which our intervention has been transformed by, while also transforming, discussions about participatory media, open and collaborative peer review, production costs, and the intersections of technical and intellectual labor.
http://adanewmedia.org
http://fembotcollective.org
https://library.uoregon.edu/digitalscholarship
PhD-Program Preparation for Successful Post-PhD CareerTao Xie
Slides of keynote talk on "PhD-Program Preparation for Successful Post-PhD Career" at Doctoral Symposium at International Symposium in Software Testing and Analysis (ISSTA 2013) http://issta2013.inf.usi.ch/doctoralsymposium
Advice to New Scientists (combo from Jim and Rod)Jim Woodgett
What are the most important things to know when starting up your own independent research group in academia? While the authors of this presentation set up their groups in another, more generous era, there are lessons they learned which have stood the test of time (better than their hair).
Repaving the Road to Hell with the Common CV and CIHR ReformsJim Woodgett
How the very best of intentions and clearly obvious solutions can fall prey to abysmal implementation and too many cooks in the kitchen. A few lessons from the tragedy of the Canadian Common CV and the CIHR reforms. Let's hope the errors are not repeated.
Publishing Ada: A Retrospective Look at the First Three Years of an Open Peer...Karen Estlund
Presentation by: Karen Estlund, Sarah Hamid, and Bryce Peake
At the CNI spring 2012 meeting, we presented on a new collaborative journal publishing project from The Fembot Collective and the University of Oregon (UO) Libraries, Ada: A Journal of Gender, New Media, and Technology. The Fembot Collective is a collaborative of feminist media scholars, producers, and artists engaged with the intersection of new media and technology and scholarly communication. One aspiration of this project was to reclaim the means of scholarly production through a community-centered model of open peer review and multi-modal publication processes. As a work in progress, Ada has continuously evolved to meet the needs of diverse authors, readers, and commentators. In the face of changing scholarly communication practices, the Fembot and library collaboration offers an alternative system of open-access publication and review that recaptures academic production structures in favor of cross-disciplinary, multi-modal, collaborative knowledge. Our community standards state that “responding is political work” emphasizing a space that demands constant redirection and active participation by its collaborators in order to generate new expressions of feminist open access scholarship over time. Now in our third year of publication and working on our ninth issue, we will review lessons learned about audience, production, infrastructure, design and assessment. We will discuss the ways in which our intervention has been transformed by, while also transforming, discussions about participatory media, open and collaborative peer review, production costs, and the intersections of technical and intellectual labor.
http://adanewmedia.org
http://fembotcollective.org
https://library.uoregon.edu/digitalscholarship
PhD-Program Preparation for Successful Post-PhD CareerTao Xie
Slides of keynote talk on "PhD-Program Preparation for Successful Post-PhD Career" at Doctoral Symposium at International Symposium in Software Testing and Analysis (ISSTA 2013) http://issta2013.inf.usi.ch/doctoralsymposium
Advice to New Scientists (combo from Jim and Rod)Jim Woodgett
What are the most important things to know when starting up your own independent research group in academia? While the authors of this presentation set up their groups in another, more generous era, there are lessons they learned which have stood the test of time (better than their hair).
Repaving the Road to Hell with the Common CV and CIHR ReformsJim Woodgett
How the very best of intentions and clearly obvious solutions can fall prey to abysmal implementation and too many cooks in the kitchen. A few lessons from the tragedy of the Canadian Common CV and the CIHR reforms. Let's hope the errors are not repeated.
New Investigators: starting up and keeping goingJim Woodgett
Talk at Nov 2013 New Principal Investigators meeting discussing startup negotiating, what to ask for, what others ask for, why the first 5 years of an independent position is so important and how to tease seed funding. Canadian context but applicable to many scenarios.
Presentation held at Dundee University on 19 January 2011 for postgraduate students for the purpose of providing guidelines and advice on how to complete their PhD research degrees, successfully.
From research student to academic: thinking about and preparing for academic ...Joss Winn
Preparing for academic life (or not). See also: http://josswinn.org/2015/07/from-research-student-to-academic-thinking-about-and-preparing-for-academic-work/
This stack of slides describes my view on how to work as a PhD student. The presentation was targeted a Ubiquitous Computing audience, but is fairly generic in nature.
Running head WOODSREDU5000-1WOODSREDU5000-42A.docxtoltonkendal
Running head: WOODSREDU5000-1
WOODSREDU5000-4
2
Analyze Research
EDU-5000: Foundation for Graduate Study in Education
Running head: WOODSREDU5000-4
1
WOODSREDU5000-1
Autism is a complicated progressive disability. Researchers think that Autism exhibits itself during the age of 18 to 36 months old. The illness is the effect of a neurological condition that has an influence on natural brain performance, effecting promotion of the individual’s social and communication abilities. A student with an autism disorder will have a problem with non-verbal skills, and difficulty with activities which involve an environment of play and/or joking. They could have uncommon replies to society, connections to items, refusal to accept an adjustment in their daily routines, and severe behavior challenges.
Autism Challenges
I am Interested in understanding Autism behavior challenges to improve classroom management. As a Special Education teacher understanding Autism behaviors can be very beneficial. A projection of 1 in every 68 citizens in the country has various types of autism; boys are more prevalent than girls. Several professionals think that this (ASD) is linked hereditary or through the atmosphere. Studies show in a classroom of 18 or more. Typically, at least two of the classroom children for each one student are diagnosed with (ASD). Children with (ASD) show disruptive behaviors, and many of them have problems like harming self and anger tantrum. Behaviors form anxiety for parents and specialists, because it inconsistent with the development of desired behaviors and communication skills (DSM-5, 2013), and have risks on child himself and others. Findings show after researching over a hundred teachers in a public major school of students who strugglers with ASDs.
Lack of classroom management, and inconsistent strategies played a huge factor in behaviors. An effort to be made by schools to address the teacher’s perception of causes of challenging behavior as it has an influence on their choice of management strategies. Also, the teachers agreed that the behavior was learned,
and could be improved, but they did not often use strategies that are commonly considered to be effective, at least within the fields of ABA and PBS (Baron, Groden, & Lipsitt 2006). Consistency and reinforcement, they are solutions for resolving occurring behaviors, which increase the likelihood that behavior will continue to occur or occur more often (Cooper, Heron, & Heward, 2007).
Keywords and help with searches
Definition of Keywords is described as thoughts in a subject area that drive and tell what your content in tells. Phrased or keywords are put into the “search queries” or search engine to generate various types of information, descriptions, film, and duplicates pertaining to your content. The keywords are vital to the search because they are the key player among what a person is probing for and the matter provide to fill up that need. The significa ...
Composition II Advocacy Assignment · Peer Review Essay III betLynellBull52
Composition II
Advocacy Assignment
· Peer Review Essay III between March 30th and 11:59 PM
I ask that you do not write about abortion and gun control or related topics in this assignment. Any paper on these topics will not be accepted for a grade.
All work submitted for this class must be specifically written for this class.
Skills you will learn/practice in this assignment include (but are not limited to):
1. Determining and narrowing down a research topic.
2. Find the appropriate tone to write for an academic audience.
3. Critical reading and thinking skills.
4. Conducting research on specific issues and aspects of a larger topic.
5. Synthesizing information from outside sources into your paper.
6. Using quotations from outside sources effectively.
7. Providing in text citations in proper MLA format.
8. Organizing a paper to clearly answer several aspects of a topic in a logical manner with each topic building on the previous one.
9. Using formal tone and diction (word choice).
10. Creating a Works Cited page in correct MLA format.
11. Using transitions for smooth flow.
12. Editing and proofreading.
Advocacy Proposal must be submitted and approved prior to submitting the paper. The paper will not be accepted, and you will not receive credit for it unless this proposal has been submitted and approved first.
Aim for 5 pages (double spaced using Times New Roman 12 font). You should have at least half a page (12 lines or more on the fifth page for the paper to meet the page length requirement. You should also have a Works Cited page in addition to the five pages. 5% will be deducted from papers which do not meet the page length requirement or are missing a Works Cited Page. 10% will be deducted if the paper does not meet the page length requirement and does not have a Works Cited page.
In this assignment, you will find a social issue that you find meaningful and relevant. This could be an issue that is affecting the world or our country or our state or even the local community you live in. This is not a strictly argumentative paper although you might use argument to show why this is a topic that is worthy of advocation.
Once you have identified the issue, you will write a paper advocating for this issue. Here are the points you must cover in your essay:
1. General introduction
2. What is advocacy?
3. What is the specific issue that you are advocating for?
4. Whom does this issue affect? Be specific in answering this question.
5. Why is it important to address this issue?
6. Are there programs/solutions that are already in place addressing this issue?
7. Which nonprofits are already advocating for this issue? Provide an overview of at least one nonprofit and their activities and accomplishments.
8. What do you want to persuade your audience to do (call to action)?
Your essay must go beyond informing your audience. You must also provide viable suggestions that you would like your audience, individually as well as a ...
Ethics and Diversity are two of the four Capstone Learning Outcomes,.docxAlleneMcclendon878
Ethics and Diversity are two of the four Capstone Learning Outcomes, and collaboration is one of the SLA competencies associated with the course outcome of Communication. You will collaborate with your classmates throughout this course by providing feedback and suggestions for improvement on several course assignments, as well as participating in group problem-solving. Like all the pre-assessments, this activity allows you to demonstrate your current strengths and identify areas you’ll need to improve to successfully complete the Capstone. Specifically in this group exercise you will consider the relationship between academic honesty and workplace honesty. We hope you will find this an accessible topic. It’s essential you demonstrate your best work, as we will use the results to determine individual remediation needs and your own readiness for the Capstone.
In its most simple meaning,
ethics
is a system of moral principles. The study of ethics is a branch of philosophy examining standards of right and wrong. For a quick overview of major ethical theories, review the
Ethics Resources
[PDF File size, 26KB] document.
It’s also important that you pause to consider your personal experience
with—or
study
of—diverse
cultures and contemplate how personal biases, emotions, and stereotypes can affect the way cultural issues may be perceived. For a quick overview of cross-cultural theory, review the
Diverse Cultures Resources
[PDF File size, 84KB] document.
Achieving group consensus through collaborative communication is a skill employers increasingly find valuable. Learning with others is a synergistic process.
Laal
and
Laal
(2012) emphasize the potential value of collaboration as a learning tool, provided that individuals accept responsibility for their own actions and acknowledge the value of others’ contributions to a final product. The process of collaboration can help develop an individual’s critical thinking, problem solving, and communication
skills—skills
employers tend to place on their “most desired” list for prospective employees.
Directions for the Collaborative Activity
Issues related to academic honesty and integrity are increasingly prevalent in higher education. When presented with the evidence of their academic dishonesty, some react defensively and claim they’re being falsely accused, while others allege discriminatory practices and blame anyone and everything except themselves for the situation. You’re probably most aware of plagiarism as an academic honesty violation. Here is a different type of problem.
Smart Strategy or Slippery Slope
A student
thinks the degree "is just a piece of paper" needed to get a better job. The student decides to outsource capstone assignments, sends weekly materials to a ghostwriter saying "follow the instructions, don't plagiarize, and don't miss the deadlines." She submits the assignments and gets good grades, until the ghostwriting arrangement is discovered. When confronted, the stud.
New Investigators: starting up and keeping goingJim Woodgett
Talk at Nov 2013 New Principal Investigators meeting discussing startup negotiating, what to ask for, what others ask for, why the first 5 years of an independent position is so important and how to tease seed funding. Canadian context but applicable to many scenarios.
Presentation held at Dundee University on 19 January 2011 for postgraduate students for the purpose of providing guidelines and advice on how to complete their PhD research degrees, successfully.
From research student to academic: thinking about and preparing for academic ...Joss Winn
Preparing for academic life (or not). See also: http://josswinn.org/2015/07/from-research-student-to-academic-thinking-about-and-preparing-for-academic-work/
This stack of slides describes my view on how to work as a PhD student. The presentation was targeted a Ubiquitous Computing audience, but is fairly generic in nature.
Running head WOODSREDU5000-1WOODSREDU5000-42A.docxtoltonkendal
Running head: WOODSREDU5000-1
WOODSREDU5000-4
2
Analyze Research
EDU-5000: Foundation for Graduate Study in Education
Running head: WOODSREDU5000-4
1
WOODSREDU5000-1
Autism is a complicated progressive disability. Researchers think that Autism exhibits itself during the age of 18 to 36 months old. The illness is the effect of a neurological condition that has an influence on natural brain performance, effecting promotion of the individual’s social and communication abilities. A student with an autism disorder will have a problem with non-verbal skills, and difficulty with activities which involve an environment of play and/or joking. They could have uncommon replies to society, connections to items, refusal to accept an adjustment in their daily routines, and severe behavior challenges.
Autism Challenges
I am Interested in understanding Autism behavior challenges to improve classroom management. As a Special Education teacher understanding Autism behaviors can be very beneficial. A projection of 1 in every 68 citizens in the country has various types of autism; boys are more prevalent than girls. Several professionals think that this (ASD) is linked hereditary or through the atmosphere. Studies show in a classroom of 18 or more. Typically, at least two of the classroom children for each one student are diagnosed with (ASD). Children with (ASD) show disruptive behaviors, and many of them have problems like harming self and anger tantrum. Behaviors form anxiety for parents and specialists, because it inconsistent with the development of desired behaviors and communication skills (DSM-5, 2013), and have risks on child himself and others. Findings show after researching over a hundred teachers in a public major school of students who strugglers with ASDs.
Lack of classroom management, and inconsistent strategies played a huge factor in behaviors. An effort to be made by schools to address the teacher’s perception of causes of challenging behavior as it has an influence on their choice of management strategies. Also, the teachers agreed that the behavior was learned,
and could be improved, but they did not often use strategies that are commonly considered to be effective, at least within the fields of ABA and PBS (Baron, Groden, & Lipsitt 2006). Consistency and reinforcement, they are solutions for resolving occurring behaviors, which increase the likelihood that behavior will continue to occur or occur more often (Cooper, Heron, & Heward, 2007).
Keywords and help with searches
Definition of Keywords is described as thoughts in a subject area that drive and tell what your content in tells. Phrased or keywords are put into the “search queries” or search engine to generate various types of information, descriptions, film, and duplicates pertaining to your content. The keywords are vital to the search because they are the key player among what a person is probing for and the matter provide to fill up that need. The significa ...
Composition II Advocacy Assignment · Peer Review Essay III betLynellBull52
Composition II
Advocacy Assignment
· Peer Review Essay III between March 30th and 11:59 PM
I ask that you do not write about abortion and gun control or related topics in this assignment. Any paper on these topics will not be accepted for a grade.
All work submitted for this class must be specifically written for this class.
Skills you will learn/practice in this assignment include (but are not limited to):
1. Determining and narrowing down a research topic.
2. Find the appropriate tone to write for an academic audience.
3. Critical reading and thinking skills.
4. Conducting research on specific issues and aspects of a larger topic.
5. Synthesizing information from outside sources into your paper.
6. Using quotations from outside sources effectively.
7. Providing in text citations in proper MLA format.
8. Organizing a paper to clearly answer several aspects of a topic in a logical manner with each topic building on the previous one.
9. Using formal tone and diction (word choice).
10. Creating a Works Cited page in correct MLA format.
11. Using transitions for smooth flow.
12. Editing and proofreading.
Advocacy Proposal must be submitted and approved prior to submitting the paper. The paper will not be accepted, and you will not receive credit for it unless this proposal has been submitted and approved first.
Aim for 5 pages (double spaced using Times New Roman 12 font). You should have at least half a page (12 lines or more on the fifth page for the paper to meet the page length requirement. You should also have a Works Cited page in addition to the five pages. 5% will be deducted from papers which do not meet the page length requirement or are missing a Works Cited Page. 10% will be deducted if the paper does not meet the page length requirement and does not have a Works Cited page.
In this assignment, you will find a social issue that you find meaningful and relevant. This could be an issue that is affecting the world or our country or our state or even the local community you live in. This is not a strictly argumentative paper although you might use argument to show why this is a topic that is worthy of advocation.
Once you have identified the issue, you will write a paper advocating for this issue. Here are the points you must cover in your essay:
1. General introduction
2. What is advocacy?
3. What is the specific issue that you are advocating for?
4. Whom does this issue affect? Be specific in answering this question.
5. Why is it important to address this issue?
6. Are there programs/solutions that are already in place addressing this issue?
7. Which nonprofits are already advocating for this issue? Provide an overview of at least one nonprofit and their activities and accomplishments.
8. What do you want to persuade your audience to do (call to action)?
Your essay must go beyond informing your audience. You must also provide viable suggestions that you would like your audience, individually as well as a ...
Ethics and Diversity are two of the four Capstone Learning Outcomes,.docxAlleneMcclendon878
Ethics and Diversity are two of the four Capstone Learning Outcomes, and collaboration is one of the SLA competencies associated with the course outcome of Communication. You will collaborate with your classmates throughout this course by providing feedback and suggestions for improvement on several course assignments, as well as participating in group problem-solving. Like all the pre-assessments, this activity allows you to demonstrate your current strengths and identify areas you’ll need to improve to successfully complete the Capstone. Specifically in this group exercise you will consider the relationship between academic honesty and workplace honesty. We hope you will find this an accessible topic. It’s essential you demonstrate your best work, as we will use the results to determine individual remediation needs and your own readiness for the Capstone.
In its most simple meaning,
ethics
is a system of moral principles. The study of ethics is a branch of philosophy examining standards of right and wrong. For a quick overview of major ethical theories, review the
Ethics Resources
[PDF File size, 26KB] document.
It’s also important that you pause to consider your personal experience
with—or
study
of—diverse
cultures and contemplate how personal biases, emotions, and stereotypes can affect the way cultural issues may be perceived. For a quick overview of cross-cultural theory, review the
Diverse Cultures Resources
[PDF File size, 84KB] document.
Achieving group consensus through collaborative communication is a skill employers increasingly find valuable. Learning with others is a synergistic process.
Laal
and
Laal
(2012) emphasize the potential value of collaboration as a learning tool, provided that individuals accept responsibility for their own actions and acknowledge the value of others’ contributions to a final product. The process of collaboration can help develop an individual’s critical thinking, problem solving, and communication
skills—skills
employers tend to place on their “most desired” list for prospective employees.
Directions for the Collaborative Activity
Issues related to academic honesty and integrity are increasingly prevalent in higher education. When presented with the evidence of their academic dishonesty, some react defensively and claim they’re being falsely accused, while others allege discriminatory practices and blame anyone and everything except themselves for the situation. You’re probably most aware of plagiarism as an academic honesty violation. Here is a different type of problem.
Smart Strategy or Slippery Slope
A student
thinks the degree "is just a piece of paper" needed to get a better job. The student decides to outsource capstone assignments, sends weekly materials to a ghostwriter saying "follow the instructions, don't plagiarize, and don't miss the deadlines." She submits the assignments and gets good grades, until the ghostwriting arrangement is discovered. When confronted, the stud.
Research, Writing, and Publishing in High Impact JournalsDr. Abdul Mujeebu M
This is compilation of my presentations in a recent workshop at AMU Aligarh, India. Interested institutions can contact me for conducting similar workshop.
presentation at annual Higher Education Learning and Teaching Association of Southern Africa (Heltasa) conference at the University of the Free State, November 2014
1IntroductionSocial Change can be described as the various.docxfelicidaddinwoodie
1
Introduction
Social Change can be described as the various social and civic activities that produce a change is behavior and through awareness and understanding (). From the very first class a student participates in they will be immersed in the university’s mission statement. Many students write papers on what they believe is social change, and how Walden uses this concept to revolutionize the educational experience. Social change can be thought of as a phenomenon that if fully bought in to and accepted, could change an individual’s life as well as the community for which they serve.
Background Statement (2 pages, all about background, social change, problem, a gap…)
For almost 50 years Walden University has been educating Adults from over 50 countries (). Their mission has always been focused on bringing education to people who are engaged in full-time careers and juggle the academic and family responsibilities (). Their diverse community of students and faculty is one of the corner stones that set them apart from many other educational facilities. They continue to highlight the achievements of students and alumni for bringing about social change in their communities.
Social Change as a Social Issue
Social Change as Research Problem
Research Gap (your research project gap)
Purpose Statement (Your course research purpose statement that includes social change considerations; at least one full paragraph)
Researcher Role
The Experience (based on your memos, field notes, and other experiences)
Your Role (what is your role as a qualitative researcher in this study)
Ethical Issues (what are the ethical issues for this study - all research has potential ethical issues)
Results (I will do this section)
Data Sources
Videos
Interview
Social Change Website
Instrumentation (e.g. questionnaires, interviews, journals, memos, observations, etc)
Who and Date
Previous Use Info
Appropriateness
Data Analysis
Process (intro paragraph)
1st Cycle - codes
2nd Cycle - categories
Themes
Trustworthiness
Theme Differences (across the sources you used for this project)
Trustworthiness
Credibility
Transferability
Dependability Strategies
Confirmability
Summary
Social Change
Self-Reflection
Social Change Article Alignment
References
Assignment 2: Employment-At-Will Doctrine
Due Week 5 and worth 150 points
Imagine you are a recently-hired Chief Operating Officer (COO) in a midsize company preparing for an Initial Public Offering (IPO). You quickly discover multiple personnel problems that require your immediate attention.
1. John posted a rant on his Facebook page in which he criticized the company’s most important customer.
2. Ellen started a blog to protest the CEO’s bonus, noting that no one below director has gotten a raise in two (2) years and portraying her bosses as “know-nothings” and “out-of-touch”
3. Bill has been using his company-issued BlackBerry to run his own business on the side.
4. After being disciplined for criticizing a customer in an e ...
Peer review is often seen as a cornerstone of modern science. We are going to discuss the current peer review practices in software engineering research, their strengths and limitations. Next we will discuss tips and tricks for writing code reviews, as well as implications for writing papers. I will also share some insights in my own reviewing practices.
Towards Continuous Performance Assessment of Java Applications With PerfBotAlexander Serebrenik
Bots for continuous performance assessment are gaining use as a productivity tool. We discuss how and why open source projects use them and present an in-depth case study of the Nanosoldier bot used by the team behind the Julia programming language. Based on analysing the history of bot usage and interviews with developers we identify lack of a shared platform for performance measurement as an obstacle to wider adoption of performance measurement bots. To address this, we propose a prototype implementation of such a platform called PerfBot.
Joint work with Florian Markusse and Philipp Leitner, presented at 5th International Workshop on
Bots in Software Engineering, collocated with ICSE 2023, Melbourne Australia.
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software...Alexander Serebrenik
The intersection of ageism and sexism can create a hostile environment for veteran software developers belonging to marginalized genders. In this study, we conducted 14 interviews to examine the experiences of people at this intersection, primarily women, in order to discover the strategies they employed in order to successfully remain in the field. We identified 283 codes, which fell into three main categories: Strategies, Experiences, and Perception. Several strategies we identified, such as (Deliberately) Not Trying to Look Younger, were not previously described in the software engineering literature. We found that, in some companies, older women developers are recognized as having particular value, further strengthening the known benefits of diversity in the workforce. Based on the experiences and strategies, we suggest organizations employing software developers to consider the benefits of hiring veteran women software developers. For example, companies can draw upon the life experiences of older women developers in order to better understand the needs of customers from a similar demographic. While we recognize that many of the strategies employed by our study participants are a response to systemic issues, we still consider that, in the short-term, there is benefit in describing these strategies for developers who are experiencing such issues today.
This paper is a joint work with Sterre van Breukelen, Ann Barcomb and Sebastian Baltes
Preprint https://arxiv.org/abs/2302.03723
A Qualitative Study of Developers’ Discussions of Their Problems and Joys Dur...Alexander Serebrenik
Many software developers started to work from home on a short notice during the early periods of COVID-19. A number of previous papers have studied the wellbeing and productivity of software developers during COVID-19. The studies mainly use surveys based on predefined questionnaires. In this paper, we investigate the problems and joys that software developers experienced during the early months of COVID-19 by analyzing their discussions in online forum devRant, where discussions can be open and not bound by predefined survey questionnaires. The devRant platform is designed for developers to share their joys and frustrations of life. We manually analyze 825 devRant posts between January and April 12, 2020 that developers created to discuss their situation during COVID19. WHO declared COVID-19 as pandemic on March 11, 2020. As such, our data offers us insights in the early months of COVID-19. We manually label each post along two dimensions: the topics of the discussion and the expressed sentiment polarity (positive, negative, neutral). We observed 19 topics that we group into six categories: Workplace & Professional aspects, Personal & Family well-being, Technical Aspects, Lockdown preparedness, Financial concerns, and Societal and Educational concerns. Around 49% of the discussions are negative and 26% are positive. We find evidence of developers’ struggles with lack of documentation to work remotely and with their loneliness while working from home. We find stories of their job loss with little or no savings to fallback to. The analysis of developer discussions in the early months of a pandemic will help various stakeholders (e.g., software companies) make important decision early to alleviate developer problems if such a pandemic or similar emergency situation occurs in near future. Software engineering research can make further efforts to develop automated tools for remote work (e.g., automated documentation).
Empirical Software Engineering 27(5): 117 (2022), presented at ICSE 2023 as part of the Journal First program.
Software developers are known to experience a wide range of emotions while performing development tasks. Emotions expressed in developer communication might reflect openness of the ecosystem to newcomers, presence of conflicts, problems in the software development process or source code itself. In this talk, based on a recent work with Nicole Novielli, I present an overview of the state-of-the-art research on analysis of emotions in software engineering focusing on the studies of emotion in context of software ecosystems. To encourage further applications of emotion analysis in the industry and research we also discuss currently available emotion analysis tools and datasets as well as outline directions for future research.
This is a keynote talk given at the 11th International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems (SESoS 2023), collocated with ICSE 2023 in Melbourne, Australia.
Investigating the Resolution of Vulnerable Dependencies with Dependabot Secur...Alexander Serebrenik
Modern software development practices increasingly rely on third-party libraries due to the inherent benefits of reuse. However, libraries may contain security vulnerabilities that can propagate to the dependent applications. To counter this, maintainers of dependent projects should monitor their dependencies and security reports to ensure that only patched releases of the upstream applications are in use. As manual maintenance of dependencies has shown to be ineffective, several automated tools (aka bots) have been proposed to assist developers in rapidly identifying and resolving vulnerable dependencies.
In this work, we focus on Dependabot, a popular bot providing security and version updates, and study developers' receptivity to its security updates in engineered and actively maintained JavaScript projects. Moreover, we carry out a fine-grained analysis of the lifecycle of every vulnerability to manifest how they are dealt with in the presence of Dependabot.
Our findings show that the task of fixing vulnerable dependencies is, to a large extent, delegated to Dependabot and that developers merge the majority of security updates within several days. On the other hand, when developers do not merge a security update, they usually address the identified vulnerability manually. This approach, however, often takes up to several months which in turn could expose the projects to security issues.
This paper has won the ACM Distinguished paper award at MSR 2023.
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsAlexander Serebrenik
Static analysis tools generate a large number of
alarms that require manual inspection. In prior work, repositioning of alarms is proposed to (1) merge multiple similar alarms
together and replace them by a fewer alarms, and (2) report
alarms as close as possible to the causes for their generation. The
premise is that the proposed merging and repositioning of alarms
will reduce the manual inspection effort. To evaluate the premise,
this paper presents an empirical study with 249 developers on
the proposed merging and repositioning of static alarms. The
study is conducted using static analysis alarms generated on C
programs, where the alarms are representative of the merging vs.
non-merging and repositioning vs. non-repositioning situations
in real-life code. Developers were asked to manually inspect and
determine whether assertions added corresponding to alarms in
C code hold. Additionally, two spatial cognitive tests are also
done to determine relationship in performance. The empirical
evaluation results indicate that, in contrast to expectations, there
was no evidence that merging and repositioning of alarms reduces
manual inspection effort or improves the inspection accuracy (at
times a negative impact was found). Results on cognitive abilities
correlated with comprehension and alarm inspection accuracy.
Static analysis tools help to detect common programming errors but generate a large number of false positives.
Moreover, when applied to evolving software systems, around
95% of alarms generated on a version are repeated, i.e., they
have also been generated on the previous version. Version-aware
static analysis techniques (VSATs) have been proposed to suppress
the repeated alarms that are not impacted by the code changes
between the two versions. The alarms reported by VSATs after
the suppression, called delta alarms, still constitute 63% of the
tool-generated alarms.
We observe that delta alarms can be further postprocessed
using their corresponding code changes: the code changes due
to which VSATs identify them as delta alarms. However, none
of the existing VSATs or alarms postprocessing techniques
postprocesses delta alarms using the corresponding code changes.
Based on this observation, we use the code changes to classify
delta alarms into six classes that have different priorities assigned
to them. The assignment of priorities is based on the type of
code changes and their likelihood of actually impacting the delta
alarms. The ranking of alarms, obtained by prioritizing the
classes, can help suppress alarms that are ranked lower, when
resources to inspect all the tool-generated alarms are limited.
We performed an empirical evaluation using 9789 alarms
generated on 59 versions of seven open source C applications.
The evaluation results indicate that the proposed classification
and ranking of delta alarms help to identify, on average, 53% of
delta alarms as more likely to be false positives than the others.
What Is an AI Engineer? An Empirical Analysis of Job Ads in The NetherlandsAlexander Serebrenik
Recently, the job market for Artificial Intelligence (AI) engineers
has exploded. Since the role of AI engineer is relatively new, limited
research has been done on the requirements as set by the industry.
Moreover, the definition of an AI engineer is less established than
for a data scientist or a software engineer. In this study we explore,
based on job ads, the requirements from the job market for the
position of AI engineer in The Netherlands. We retrieved job ad
data between April 2018 and April 2021 from a large job ad database,
Jobfeed from TextKernel. The job ads were selected with a process
similar to the selection of primary studies in a literature review. We
characterize the 367 resulting job ads based on meta-data such as
publication date, industry/sector, educational background and job
titles. To answer our research questions we have further coded 125
job ads manually.
The job tasks of AI engineers are concentrated in five categories:
business understanding, data engineering, modeling, software development and operations engineering. Companies ask for AI engineers with different profiles: 1) data science engineer with focus
on modeling, 2) AI software engineer with focus on software development, 3) generalist AI engineer with focus on both models
and software. Furthermore, we present the tools and technologies
mentioned in the selected job ads, and the soft skills.
Our research helps to understand the expectations companies
have for professionals building AI-enabled systems. Understanding
these expectations is crucial both for prospective AI engineers and
educational institutions in charge of training those prospective
engineers. Our research also helps to better define the profession of
AI engineering. We do this by proposing an extended AI engineering life-cycle that includes a business understanding phase.
Joint work with Marcel Meesters and Petra Heck.
Community smells are patterns indicating suboptimal organization and communication of software development teams that have been shown to be related to suboptimal organisation of the source code. Given a long standing association of women and communication mediation, we have conducted a series of studies relating gender diversity to community smells, as well as comparing the results of the data analysis with developers' perception. To get further insights in the relation bwteen gender and community smells, we replicate our study focusing on the Brazilian software teams; indeed, culture-specific expectations on the behavior of people of different genders might have affected the perception of the importance of gender diversity and refactoring strategies when mitigating community smells. Finally, we extend the prediction model by including variables related to national diversity and see how the interplay between national diversity and gender diversity influences presence of community smells.
This talk is based on a series of papers published in 2019-2022 and co-authored with Gemma Catolino, Filomena Ferrucci, Stefano Lambiase, Tiago Massoni, Fabio Palomba, Camila Sarmento, and Damian Andrew Tamburri.
Overview of a series of papers published in 2019-2021 on community smells, and their relation to code smells and gender, as well as resolution strategies.
Women in Dutch Computer Science: Best Practices for Recruitment, Onboarding a...Alexander Serebrenik
Women are underrepresented at all levels in computer science (CS) faculties of Dutch
universities. In this report we focus on experiences related to hiring and promoting women as assistant, associate and full professors (or equivalent at NWO-I CWI).
In 2003 Dave et al. have coined the term “opinion mining” to refer to “processing a set of search results for a given item, generating a list of product attributes (quality, features, etc.) and aggregating opinions about each of them (poor, mixed, good)”. Nine years later, in 2012 Brooks and Swigger have applied sentiment analysis in the context of software engineering. Today another nine years have passed and it is time to look back: what have we achieved as a research community and where should we go next?
To answer this question we conducted a systematic literature review involving 185 papers. Based on the literature review we present 1) well-defined categories of opinion mining-related software development activities, 2) available opinion mining approaches, whether they are evaluated when adopted in other studies, and how their performance is compared, 3) available datasets for performance evaluation and tool customization, and 4) concerns or limitations SE researchers might need to take into account when applying/customizing these opinion mining techniques. The results of our study serve as references to choose suitable opinion mining tools for SE tasks, and provide critical insights for the further development of opinion mining techniques in the SE domain.
This work has been done together with Bin Lin, Gabriele Bavota and Michele Lanza from Università della Svizzera italiana, Switzerland, Nathan Cassee from Eindhoven University of Technology, The Netherlands and Nicole Novielli from University of Bari, Italy.
In this talk I will present results obtained on removing self-admitted technical debt. Self-admitted technical debt is an indication in the source code, usually n the source code comments, that the code is not in the right shape yet. Joint work with Emad Shihab, Everton Maldonado, Rabe Abdelkareem, Fiorella Zampetti, Massimiliano Di Penta and Gianmarco Fucci.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
A brief information about the SCOP protein database used in bioinformatics.
The Structural Classification of Proteins (SCOP) database is a comprehensive and authoritative resource for the structural and evolutionary relationships of proteins. It provides a detailed and curated classification of protein structures, grouping them into families, superfamilies, and folds based on their structural and sequence similarities.
This pdf is about the Schizophrenia.
For more details visit on YouTube; @SELF-EXPLANATORY;
https://www.youtube.com/channel/UCAiarMZDNhe1A3Rnpr_WkzA/videos
Thanks...!
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Sérgio Sacani
Since volcanic activity was first discovered on Io from Voyager images in 1979, changes
on Io’s surface have been monitored from both spacecraft and ground-based telescopes.
Here, we present the highest spatial resolution images of Io ever obtained from a groundbased telescope. These images, acquired by the SHARK-VIS instrument on the Large
Binocular Telescope, show evidence of a major resurfacing event on Io’s trailing hemisphere. When compared to the most recent spacecraft images, the SHARK-VIS images
show that a plume deposit from a powerful eruption at Pillan Patera has covered part
of the long-lived Pele plume deposit. Although this type of resurfacing event may be common on Io, few have been detected due to the rarity of spacecraft visits and the previously low spatial resolution available from Earth-based telescopes. The SHARK-VIS instrument ushers in a new era of high resolution imaging of Io’s surface using adaptive
optics at visible wavelengths.
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
Deep Behavioral Phenotyping in Systems Neuroscience for Functional Atlasing a...Ana Luísa Pinho
Functional Magnetic Resonance Imaging (fMRI) provides means to characterize brain activations in response to behavior. However, cognitive neuroscience has been limited to group-level effects referring to the performance of specific tasks. To obtain the functional profile of elementary cognitive mechanisms, the combination of brain responses to many tasks is required. Yet, to date, both structural atlases and parcellation-based activations do not fully account for cognitive function and still present several limitations. Further, they do not adapt overall to individual characteristics. In this talk, I will give an account of deep-behavioral phenotyping strategies, namely data-driven methods in large task-fMRI datasets, to optimize functional brain-data collection and improve inference of effects-of-interest related to mental processes. Key to this approach is the employment of fast multi-functional paradigms rich on features that can be well parametrized and, consequently, facilitate the creation of psycho-physiological constructs to be modelled with imaging data. Particular emphasis will be given to music stimuli when studying high-order cognitive mechanisms, due to their ecological nature and quality to enable complex behavior compounded by discrete entities. I will also discuss how deep-behavioral phenotyping and individualized models applied to neuroimaging data can better account for the subject-specific organization of domain-general cognitive systems in the human brain. Finally, the accumulation of functional brain signatures brings the possibility to clarify relationships among tasks and create a univocal link between brain systems and mental functions through: (1) the development of ontologies proposing an organization of cognitive processes; and (2) brain-network taxonomies describing functional specialization. To this end, tools to improve commensurability in cognitive science are necessary, such as public repositories, ontology-based platforms and automated meta-analysis tools. I will thus discuss some brain-atlasing resources currently under development, and their applicability in cognitive as well as clinical neuroscience.
4. Theory (Eindhoven): 50% research, 40% teaching, 10% service
Practice (me): 40% research, 30% teaching, 30% service
Beware: ~60 working hours per week are not an exception
20. web chair
PC deadlines, notifications send,
program, keynote speakers,
preprints
track
loca
social events, rooms, local and
travel information
social
media
chair
publi call for papers
24. Checklist
• Jane Doe vs. Jane A. Doe
• Page limits
• Official style files
• Quality of the figures
• Orphans and widows
• Scalable fonts, font embedding,…
• and more!
https://www.conference-publishing.com/Help.php
39. 3.2 Zero, single,
double or triple
blind?
Pieter Bruegel the Elder, The Blind Leading the Blind (1568) Museo di Capodimonte, Naples,
Italy
40.
41. Open,
accountable
0
Not officially used on a large scale, individual reviewers
sometimes sign their reviews.
1
Till very recently most conferences were single-blind, many
conferences still are
2
Recent trend, e.g., ICSME 2017 and ICSE 2018 are double
blind.
Fair 3 Recent experiments, e.g., ICPC 2017 was triple blind.
51. 1. the person themselves;
2. a past or current student or academic advisor;
3. a supervisor or employee in the same line of authority within the past three years;
4. a member of the same organization (e.g., company, university, government
agency, etc.) within the past three years;
5. a co-author of a paper appearing in publication within the past three years;
6. someone with whom there has been a financial relationship (e.g., grants,
contracts, consultancies, equity investments, stock options, etc.) within the past
three years;
7. someone with whom acceptance or rejection would further the personal goals of
the reviewer (e.g., a competitor);
8. a member of the same family or anyone considered a close personal friend; or
9. someone about whom, for whatever reason, their work cannot be evaluated
objectively.
ACM SIGSOFT Conflicts of Interest
52. ACM SIGSOFT Conflicts of Interest
person Alexander Serebrenik
academic advisor Danny De Schreye
students
W. Torres, T. Muske, J. Mengerink, B. Vasilescu, Y. Luo,
Y. Dajsuren, F. Ebert, M. Gupta, B. Lin, R. Jongeling, D.
Gachechiladze, C. Gerpheide, J. Businge…
supervisor/
employee/
organisation
everybody from Eindhoven Univ of Technology/CWI/
UMons, D. Spinellis (IEEE Sw), P. Avgeriou, D.
Shepherd (JSS), D. Falessi (IEEE CS Integrity)
co-author in 3 years
B. Adams, G. Robles, D. Landman, J. Vinju, F. Lanubile,
N. Novielli, D. Lo, S. Wang, A. Zagalsky, M.-A. Storey, H.
Altinger, M.-T. Valente, A. Hora, F. Castor, G. Pinto, P.T.
Devanbu, V. Filkov, B. Ray, T. Mens, J.M. González-
Barahona, A. Capiluppi, Y.-G. Guéhéneuc…
financial relation A. Zaidman, F. Palomba, …
54. ACM SIGSOFT policy on authorship
Anyone listed as Author on an ACM paper must meet all the following criteria:
• they have made substantial intellectual contributions to some components of the
original work described in the paper; and
• they have participated in drafting and/or revision of the paper; and
• they are aware that the paper has been submitted for publication; and
• they agree to be held accountable for any issues relating to correctness or integrity of
the work.
Other contributors may be acknowledged at the end of the paper, before the bibliography,
with explicitly described roles, preferably using the roles found in the CASRAI Contributor
Roles Taxonomy at http://casrai.org/CRediT
https://www.acm.org/publications/policy-on-authorship
55. Alice asked Bob to help her to improve the English in
her paper. Should Bob be considered as a co-author
on Alice’s paper?
John is a young postdoc in Mary’s lab, paid on the
project acquired by Mary. Should Mary be
considered as a co-author on John’s paper?
Pat is a scientific programmer that builds software for
Chris’s research. Pat is not involved in designing or
executing the study beyond developing software. Should
Pat be considered as a co-author on Chris’s paper?