WorldCat Identities

DeMillo, Richard A.

Overview
Works: 66 works in 167 publications in 1 language and 4,083 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor
Publication Timeline
.
Most widely held works by Richard A DeMillo
Abelard to Apple : the fate of American colleges and universities by Richard A DeMillo( Book )

3 editions published between 2011 and 2013 in English and held by 396 WorldCat member libraries worldwide

The vast majority of American college students attend two thousand or so private and public institutions that might be described as the Middle--reputable educational institutions, but not considered equal to the elite and entrenched upper echelon of the Ivy League and other prestigious schools. Richard DeMillo has a warning for these colleges and universities in the Middle: If you do not change, you are heading for irrelevance and marginalization. In Abelard to Apple, DeMillo argues that these institutions, clinging precariously to a centuries-old model of higher education, are ignoring the social, historical, and economic forces at work in today's world. In the age of iTunes, open source software, and for-profit online universities, there are new rules for higher education. DeMillo, who has spent years in both academia and in industry, explains how higher education arrived at its current parlous state and offers a road map for the twenty-first century. He describes the evolving model for higher education, from European universities based on a medieval model to American land-grant colleges to Apple's iTunes U and MIT's OpenCourseWare. He offers ten rules to help colleges reinvent themselves (including "Don't romanticize your weaknesses") and argues for a focus on teaching undergraduates. DeMillo's message--for colleges and universities, students, alumni, parents, employers, and politicians--is that any college or university can change course if it defines a compelling value proposition (one not based in "institutional envy" of Harvard and Berkeley) and imagines an institution that delivers it. -- Book cover
Foundations of secure computation by Richard A DeMillo( Book )

13 editions published in 1978 in English and held by 365 WorldCat member libraries worldwide

Data base security; Encryption as a security mechanism; Design-oriented models of operating system security; Theoretical models of operating system security
Applied cryptology, cryptographic protocols, and computer security models by R. A De Millo( Book )

15 editions published between 1983 and 1988 in English and held by 361 WorldCat member libraries worldwide

Revolution in higher education : how a small band of innovators will make college accessible and affordable by Richard A DeMillo( Book )

7 editions published between 2015 and 2017 in English and held by 332 WorldCat member libraries worldwide

Colleges and universities have become increasingly costly, and, except for a handful of highly selective, elite institutions, unresponsive to twenty-first-century needs. But for the past few years, technology-fueled innovation has begun to transform higher education, introducing new ways to disseminate knowledge and better ways to learn-all at lower cost. In this impassioned account, Richard DeMillo tells the behind-the-scenes story of these pioneering efforts and offers a road map for transforming higher education. Building on his earlier book, Abelard to Apple, DeMillo argues that the current system of higher education is clearly unsustainable. Colleges and universities are in financial crisis. Tuition rises inexorably. Graduates of reputable schools often fail to learn basic skills, and many cannot find suitable jobs. Meanwhile, student-loan default rates have soared while the elite Ivy and near-Ivy schools seem remote and irrelevant. Where are the revolutionaries who can save higher education? DeMillo's heroes are a small band of innovators who are bringing the revolution in technology to colleges and universities. DeMillo chronicles, among other things, the invention of MOOCs (Massive Open Online Courses) by professors at Stanford and MIT; Salman Khan's Khan Academy; the use of technology by struggling historically black colleges and universities to make learning more accessible; and the latest research on learning and the brain. He describes the revolution's goals and the entrenched hierarchical system it aims to overthrow; and he reframes the nature of the contract between society and its universities. The new institutions of a transformed higher education promise to demonstrate not only that education has value but also that it has values-virtues for the common good
Software testing and evaluation by Richard A DeMillo( Book )

11 editions published in 1987 in English and held by 305 WorldCat member libraries worldwide

Studies in computer science : in honor of Samuel D. Conte by John Rice( Book )

6 editions published in 1994 in English and held by 87 WorldCat member libraries worldwide

Revolution in higher education : how a small band of innovators will make college accessible and affordable by Richard A DeMillo( )

5 editions published in 2015 in English and held by 29 WorldCat member libraries worldwide

In this impassioned account, Richard DeMillo tells the behind-the-scenes story of these pioneering efforts and offers a road map for transforming higher education
Abelard to Apple : the fate of American colleges and universities in the twenty-first century by Richard A DeMillo( Book )

12 editions published between 2011 and 2014 in English and held by 19 WorldCat member libraries worldwide

The vast majority of American college students attend two thousand or so private and public institutions that might be described as the Middle--reputable educational institutions, but not considered equal to the elite and entrenched upper echelon of the Ivy League and other prestigious schools. Richard DeMillo has a warning for these colleges and universities in the Middle: If you do not change, you are heading for irrelevance and marginalization. In "Abelard to Apple", DeMillo argues that these institutions, clinging precariously to a centuries-old model of higher education, are ignoring the social, historical, and economic forces at work in today's world. In the age of iTunes, open source software, and for-profit online universities, there are new rules for higher education. DeMillo, who has spent years in both academia and in industry, explains how higher education arrived at its current parlous state and offers a road map for the twenty-first century. He describes the evolving model for higher education, from European universities based on a medieval model to American land-grant colleges to Apple's iTunes u and MIT's OpenCourseWare. He offers ten rules to help colleges reinvent themselves (including "Focus on what differentiates you") and argues for a focus on teaching undergraduates. DeMillo's message--for colleges and universities, students, alumni, parents, employers, and politicians--is that any college or university can change course if it defines a compelling value proposition (one not based in "institutional envy" of Harvard and Berkeley) and imagines an institution that delivers it
Even data bases that lie can be compromised by Richard A DeMillo( Book )

7 editions published between 1976 and 1977 in English and Undetermined and held by 7 WorldCat member libraries worldwide

Users can compromise data bases by asking a series of questions, even when the data systems are allowed to lie. (Author)
Space and time hierarchies for control structures and data structures by Richard J Lipton( Book )

6 editions published in 1975 in English and Undetermined and held by 6 WorldCat member libraries worldwide

The running time or computational complexity of a sequential process is usually determined by summing weights attached to the basic operations from which the process is derived. In practice, however, the complexity is often limited by how efficiently it can access its data structures and how efficiently it can control program flow. Furthermore, it has been extensively argued that certain limitations on the process sequencing mechanisms available to the programmer result in more 'efficient' representations for the underlying processes. In this paper the authors examine these issues in an attempt to assess the 'power' of various data and control structures
Mutation analysis by Timothy Budd( Book )

4 editions published in 1979 in English and held by 4 WorldCat member libraries worldwide

A new Type of software test, called mutation analysis, is introduced. A method of applying mutation analysis is described, and the design of several existing automated systems for applying mutation analysis to Fortran and Cobol programs is sketched. These systems have been the means for preliminary studies of the efficiency of mutation analysis and of the relationship between mutation and other systematic testing techniques. The results of several experiments to determine the effectiveness of mutation analysis are described, and examples are presented to illustrate the way in which the technique can be used to detect a wide class of errors, including many previously defined and studied in the literature. Finally, a number of empirical studies are suggested, the results of which may add confidence to the outcome of the mutation analysis of a program. (Author)
A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings by Richard A DeMillo( Book )

3 editions published in 1975 in English and held by 3 WorldCat member libraries worldwide

A constructive adaptation of the Borel-Cantelli Lemma is obtained. Applications to several problems of complexity include the existence of hard 0,1 polynomials. (Author)
Software project forecasting by Richard A DeMillo( Book )

4 editions published in 1980 in Undetermined and English and held by 3 WorldCat member libraries worldwide

We have argued that a major use of software metrics is in the forecasting problem for software projects. By analogy with weather forecasting, we may characterize the current state of knowledge in software forecasting as the gathering of portents. While these may be useful and sometimes decisive in project management, they are prescientific and qualitative. Further, it seems very unlikely that the portents can be developed into a useful theory of forecasting. To develop scientific forecasting tools, a rational way of predicting the future from historical primary data is required. It is also important that the primary data and the measurements used to obtain it satisfy some basic methodological requirements -- for example, the hypotheses developed from the measurements should be meaningful in the sense implied by measurement theory. The statistical approach, seeking to predict future events on the basis of historical patterns, seems to be an attractive short range approach to the forecasting problem. The goal of the exact method is to be able to apply largescale computation to many micropredictions to synthesize a quantitative forecast
A system architecture to support a verifiably secure multilevel security system by George Davida( Book )

4 editions published in 1980 in English and Undetermined and held by 3 WorldCat member libraries worldwide

Technology that allows significant sharing of computer resources carriers with it an increased responsibility to protect these resources from unauthorized, malicious, irresponsible, or unintended use or disclosure. The years have seen a progression of increasingly sensitive information made available in increasingly less supervised modes to a variety of users. Commercial users routinely store valuable financial information and conduct cashless transactions electronically. University professors maintain class grading forms and examinations on departmental computers. Government agencies keep extensive databases of sensitive information regarding employees, foreign nationals, U.S. citizens. The military and intelligence communities continue to press for more powerful techniques to enhance their information gathering and processing capabilities. In spite of the clear need for guarantees of security, all practical schemes to protect information stored or manipulated by such systems are either seriously flawed or reduce ultimately to a collection of physical security protocols
Mutation analysis as a tool for software quality assurance by Richard A DeMillo( Book )

2 editions published in 1980 in English and held by 3 WorldCat member libraries worldwide

A protocol for using mutation analysis as a tool for software quality assurance is described. The results of experiments on the reliability of this method are also described. (Author)
Preserving Average Proximity in Arrays by Richard A DeMillo( Book )

3 editions published between 1975 and 1976 in English and held by 3 WorldCat member libraries worldwide

The combinatorial problem of storage arrays as various kinds of list structures is examined. Embeddings of graphs are used to model the loss of proximity involved in such storage schemes, and an elementary proof that arrays cannot be stored as linear lists with bounded loss of proximity is presented. Average loss of proximity is then considered, and it is shown that arrays cannot be stored as linear lists with only bounded loss of average proximity, but can be so stored in binary trees. The former result implies that row major order is an asymptotically optimal storage strategy for arrays. (Author)
Formal semantics and the logical structure of programming languages by Richard A DeMillo( )

3 editions published in 1972 in English and held by 3 WorldCat member libraries worldwide

Implicit computation of synchronization primitives by Richard A DeMillo( Book )

2 editions published in 1978 in English and held by 2 WorldCat member libraries worldwide

Statistical Measures of Software Reliability by Richard A DeMillo( Book )

2 editions published in 1980 in English and held by 2 WorldCat member libraries worldwide

Estimating program reliability presents many of the same problems as measuring software performance and cost: the central technical issue concerns the existence of an independent objective scale upon which may be based a qualitative judgement of the ability of a given program to function as intended in a specified environment over a specified time interval. Several scales have already been proposed. While these concepts may have independent interest, they fail to capture the most significant aspect of reliability estimation as it applies to software: most software is unreliable by these standards, but the degree of unreliability is not quantified. A useful program which has not been proved correct is unreliable, but so is, say, the null program (unless by some perversity of specification the null program satisfies the designer); an operationally meaningful scale of reliability should distinguish these extremes. In the sequel, we will sketch the outlines of the traditional theory that is most relevant to software reliability estimation, give a brief critical analysis of the use of the traditional theory in measuring reliability, and describe another use of the R(t) measure which we believe more closely fits the intuitive requirements of the scale we asked for above
Social processes and proofs of theorems and programs by Richard A DeMillo( Book )

2 editions published between 1976 and 1978 in English and held by 2 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.48 (from 0.02 for Abelard to ... to 0.94 for A Construc ...)

Abelard to Apple : the fate of American colleges and universitiesAbelard to Apple : the fate of American colleges and universities in the twenty-first century
Alternative Names
DeMillo, R. A.

DeMillo, Richard Allan 1947-

Millo, Richard de 1947-

Richard DeMillo American academic

ریچارد دمیلو

Languages
English (109)

Covers
Abelard to Apple : the fate of American colleges and universities in the twenty-first century