Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Successful And Abandoned Sourceforge.Net Projects In The Initiation Stage, Charles Schweik Dec 2009

Successful And Abandoned Sourceforge.Net Projects In The Initiation Stage, Charles Schweik

National Center for Digital Government

[first paragraph] Chapter 6 provided an open source project success and abandonment dependent variable. Chapter 7 described data available in the Sourceforge.net repository and linked these data to various independent variable concepts and hypotheses presented in the theoretical part of this book. Chapter 7 also described the Classification Tree and Random Forest statistical approaches we use in this and the following chapter. This chapter presents the results of the Classification Tree analysis for successful and abandoned projects in the Initiation Stage, which in Chapter 3 (Figure 3.2), we defined as the period before and up to the time when a …


The Dependent Variable: Defining Open Source "Success" And "Abandonment" Using Sourceforge.Net Data, Charles Schweik Dec 2009

The Dependent Variable: Defining Open Source "Success" And "Abandonment" Using Sourceforge.Net Data, Charles Schweik

National Center for Digital Government

[first paragraph] From the very beginning of this research project, we understood that we needed to define what success meant in open source so that we could use that definition to create a dependent variable for our empirical studies. Does success mean a project has developed high quality software, or does it mean that the software is widely used? How might extremely valuable software that is used by only a few people, such as software for charting parts of the human genome, fit into this definition? In this chapter, we establish a robust success and abandonment measure that satisfies these …


May The Source Be With You: Exploring The Efficiency Of Open Source Techniques, Will Dickey Sep 2009

May The Source Be With You: Exploring The Efficiency Of Open Source Techniques, Will Dickey

The First-Year Papers (2010 - present)

No abstract provided.


Android Based Mobile Computing, Collaborative Project May 2009

Android Based Mobile Computing, Collaborative Project

Dyson College- Seidenberg School of CSIS : Collaborative Projects and Presentations

This entry adheres to the use of the quad chart template to provide a succinct description only of the current research project undertaken by the participants. It provides for the following information

1. Participants and Affiliations
2. Overall Project Goals
3. Illustrative picture
4. Specific research/artistic/pedagogic foci


The Open Source Software Ecosystem, Charles M. Schweik Jan 2009

The Open Source Software Ecosystem, Charles M. Schweik

National Center for Digital Government

[first paragraph] Open source research in the late 1990s and early 2000's described open source development projects as all-volunteer endeavors without the existence of monetary incentives (Chakravarty, Haruvy and Wu, 2007), and relatively recent empirical studies (Ghosh, 2005; Wolf {{243}}) confirm that a sizable percentage of open source developers are indeed volunteers.1 Open source development projects involving more than one developer were seen to follow a “hacker ethic” (Himanen, 2000; von Hippel and von Krogh, 2003) where individuals freely give away and exchange software they had written so that it could be modified and built upon, with an expectation of …


Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward Jan 2009

Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. SCADA systems have unique security and operational requirements. However, many of the most basic security measures are missing in these networks. This examines some of these issues and proposes some technologies that could help secure these networks from attack.


Psoda: Open Source Phylogenetic Search And Dna Analysis, Mark J. Clement, Quinn O. Snell, Kenneth Sundberg Jan 2009

Psoda: Open Source Phylogenetic Search And Dna Analysis, Mark J. Clement, Quinn O. Snell, Kenneth Sundberg

Faculty Publications

PSODA is an open source (GPL v2) sequence analysis package that implements sequence alignment using biochemical properties, phylogeny search with parsimony or maximum likelihood criteria and selection detection using biochemical properties (TreeSAAP ). PSODA is compatible with PAUP and the search algorithms are competitive with those in PAUP. PSODA also adds a basic scripting language to the PAUP block, making it possible to easily create advanced meta-searches. Because PSODA is open-source, we have also been able to easily add in advanced search techniques and characterize the benefits of various optimizations. PSODA is available for Macintosh OS X, Windows, and Linux.