Tags: Critical Analysis Essay On A PaintingScience Research Project Paper And Grading SchemeEssay Against Penalty ConclusionEssay Questions Emancipation ProclamationPsychological Treatments For Schizophrenia EssayGood Transition Words EssayVhdl Assignment OperatorCompare And Contrast Research Paper OutlineGlobal Business Communication EssaySolving Linear Programming Word Problems
But who decided that the corresponding prose must be corralled into a specific region of the paper?An obvious alternative is to discuss the implications of design decisions together with the description of the decisions.
She has received numerous prestigious awards for her contributions to software engineering, including the Stevens Award and the Warnier Prize.
She is a Fellow of the Association for Computing Machinery (ACM), the Institute for Electrical and Electronics Engineers (IEEE) and the American Association for the Advancement of Science (AAAS).
They usually need to discuss at least internal and external validity...
It is encouraging that recent software research papers have included discussion of threats to validity.
Clearly, other subdisciplines do things differently. I got curious about when and how the practice of uttering threats to validity came about in software engineering.
Mary Shaw's "Writing Good Software Engineering Research Papers" mini-tutorial doesn't say anything about threats.Vic Basili et al.'s 1986 classic "Experimentation in Software Engineering" is also completely un-threatening.The closest I got in terms of methodology paper is Kitchenham et al.'s "Preliminary Guidelines for Empirical Research in Software Engineering".Could it simply be that the idea of a "threats" section, pioneered by a few empirical researchers in the 1990s (e.g., Wohlin et al.), simply snowballed into what it is now?Overall I don't think the concept of a "Threats to Validity" section is a bad one: it often works very well.Shaw has taught numerous undergraduate and graduate courses and has also participated in developing innovative curricula in Computer Science for college teaching from the introductory to research level.Shaw has authored and edited seven books and over two hundred research papers and technical reports.In contrast, looking at the ECOOP 2014 proceedings, I only found 2 of 27 accepted papers using this device.At CSCW 2014, roughly half the papers had some sort of "Limitations" section, but the term "threats to validity" was not to be seen.Shaw's main area of interest is software engineering and programming systems.She does research on software architecture, end user software engineering and cybersociotechnical systems.