WorldCat Identities

DeMillo, Richard A.

Overview
Works: 75 works in 182 publications in 1 language and 3,928 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor
Classifications: LA227.4, 001.64
Publication Timeline
.
Most widely held works by Richard A DeMillo
Applied cryptology, cryptographic protocols, and computer security models by Richard A DeMillo( Book )

21 editions published between 1983 and 1988 in English and held by 386 WorldCat member libraries worldwide

Abelard to Apple : the fate of American colleges and universities by Richard A DeMillo( Book )

3 editions published between 2011 and 2013 in English and held by 385 WorldCat member libraries worldwide

The vast majority of American college students attend two thousand or so private and public institutions that might be described as the Middle--reputable educational institutions, but not considered equal to the elite and entrenched upper echelon of the Ivy League and other prestigious schools. Richard DeMillo has a warning for these colleges and universities in the Middle: If you do not change, you are heading for irrelevance and marginalization. In Abelard to Apple, DeMillo argues that these institutions, clinging precariously to a centuries-old model of higher education, are ignoring the social, historical, and economic forces at work in today's world. In the age of iTunes, open source software, and for-profit online universities, there are new rules for higher education. DeMillo, who has spent years in both academia and in industry, explains how higher education arrived at its current parlous state and offers a road map for the twenty-first century. He describes the evolving model for higher education, from European universities based on a medieval model to American land-grant colleges to Apple's iTunes U and MIT's OpenCourseWare. He offers ten rules to help colleges reinvent themselves (including "Don't romanticize your weaknesses") and argues for a focus on teaching undergraduates. DeMillo's message--for colleges and universities, students, alumni, parents, employers, and politicians--is that any college or university can change course if it defines a compelling value proposition (one not based in "institutional envy" of Harvard and Berkeley) and imagines an institution that delivers it. -- Book cover
Foundations of secure computation by Richard A DeMillo( Book )

12 editions published in 1978 in English and held by 370 WorldCat member libraries worldwide

Data base security; Encryption as a security mechanism; Design-oriented models of operating system security; Theoretical models of operating system security
Software testing and evaluation by Richard A DeMillo( Book )

11 editions published in 1987 in English and held by 307 WorldCat member libraries worldwide

Revolution in higher education : how a small band of innovators will make college accessible and affordable by Richard A DeMillo( Book )

6 editions published between 2015 and 2017 in English and held by 302 WorldCat member libraries worldwide

Studies in computer science : in honor of Samuel D. Conte by John Rice( Book )

6 editions published in 1994 in English and held by 83 WorldCat member libraries worldwide

Revolution in higher education : how a small band of innovators will make college accessible and affordable by Richard A DeMillo( )

3 editions published in 2015 in English and held by 23 WorldCat member libraries worldwide

In this impassioned account, Richard DeMillo tells the behind-the-scenes story of these pioneering efforts and offers a road map for transforming higher education
Abelard to Apple : the fate of American colleges and universities in the twenty-first century by Richard A DeMillo( Book )

12 editions published between 2011 and 2014 in English and held by 19 WorldCat member libraries worldwide

The vast majority of American college students attend two thousand or so private and public institutions that might be described as the Middle--reputable educational institutions, but not considered equal to the elite and entrenched upper echelon of the Ivy League and other prestigious schools. Richard DeMillo has a warning for these colleges and universities in the Middle: If you do not change, you are heading for irrelevance and marginalization. In "Abelard to Apple", DeMillo argues that these institutions, clinging precariously to a centuries-old model of higher education, are ignoring the social, historical, and economic forces at work in today's world. In the age of iTunes, open source software, and for-profit online universities, there are new rules for higher education. DeMillo, who has spent years in both academia and in industry, explains how higher education arrived at its current parlous state and offers a road map for the twenty-first century. He describes the evolving model for higher education, from European universities based on a medieval model to American land-grant colleges to Apple's iTunes u and MIT's OpenCourseWare. He offers ten rules to help colleges reinvent themselves (including "Focus on what differentiates you") and argues for a focus on teaching undergraduates. DeMillo's message--for colleges and universities, students, alumni, parents, employers, and politicians--is that any college or university can change course if it defines a compelling value proposition (one not based in "institutional envy" of Harvard and Berkeley) and imagines an institution that delivers it
Even data bases that lie can be compromised by Richard A DeMillo( Book )

7 editions published between 1976 and 1977 in English and Undetermined and held by 7 WorldCat member libraries worldwide

Users can compromise data bases by asking a series of questions, even when the data systems are allowed to lie. (Author)
Space and time hierarchies for control structures and data structures by Richard J Lipton( Book )

6 editions published in 1975 in English and Undetermined and held by 6 WorldCat member libraries worldwide

The running time or computational complexity of a sequential process is usually determined by summing weights attached to the basic operations from which the process is derived. In practice, however, the complexity is often limited by how efficiently it can access its data structures and how efficiently it can control program flow. Furthermore, it has been extensively argued that certain limitations on the process sequencing mechanisms available to the programmer result in more 'efficient' representations for the underlying processes. In this paper the authors examine these issues in an attempt to assess the 'power' of various data and control structures
Mutation analysis by Timothy Budd( Book )

4 editions published in 1979 in English and held by 4 WorldCat member libraries worldwide

A new type of software test is introduced, called mutation analysis. A method for applying mutation analysis is described, and the results of several experiments to determine its effectiveness are given. Finally it is shown how mutation analysis can subsume or augment many of the more traditional program testing techniques. (Author)
Can structured programs be efficient? by Richard A DeMillo( Book )

3 editions published in 1976 in English and held by 4 WorldCat member libraries worldwide

By using a new method for comparing the power of control structures, we give evidence that there are provable quantitative differences among various control structures. The key result discussed in this note states that there are natural goto programs which can only be simulated by structured programs that are either very large or very slow. (Author)
Space-Time Trade-Offs in Structured Programming by Richard A DeMillo( Book )

2 editions published in 1976 in English and held by 3 WorldCat member libraries worldwide

The report extends the results of a previous paper by improving the space-time inequality by an exponential, and includes reducible flowgraphs
Formal semantics and the logical structure of programming languages by Richard A DeMillo( )

3 editions published in 1972 in English and held by 3 WorldCat member libraries worldwide

Mutation analysis as a tool for software quality assurance by Richard A DeMillo( Book )

2 editions published in 1980 in English and held by 3 WorldCat member libraries worldwide

A protocol for using mutation analysis as a tool for software quality assurance is described. The results of experiments on the reliability of this method are also described. (Author)
Social processes and proofs of theorems and programs by Richard A DeMillo( Book )

3 editions published between 1976 and 1978 in English and held by 3 WorldCat member libraries worldwide

A Constructive Generalization of the Borel-Cantelli Lemma with Application to the Complexity of Infinite Strings by Richard A DeMillo( Book )

3 editions published in 1975 in English and held by 3 WorldCat member libraries worldwide

A constructive adaptation of the Borel-Cantelli Lemma is obtained. Applications to several problems of complexity include the existence of hard 0,1 polynomials. (Author)
Preserving Average Proximity in Arrays by Richard A DeMillo( Book )

3 editions published between 1975 and 1976 in English and held by 3 WorldCat member libraries worldwide

The combinatorial problem of storage arrays as various kinds of list structures is examined. Embeddings of graphs are used to model the loss of proximity involved in such storage schemes, and an elementary proof that arrays cannot be stored as linear lists with bounded loss of proximity is presented. Average loss of proximity is then considered, and it is shown that arrays cannot be stored as linear lists with only bounded loss of average proximity, but can be so stored in binary trees. The former result implies that row major order is an asymptotically optimal storage strategy for arrays. (Author)
Software Project Forecasting by Richard A DeMillo( Book )

4 editions published in 1980 in Undetermined and English and held by 3 WorldCat member libraries worldwide

We have argued that a major use of software metrics is in the forecasting problem for software projects. By analogy with weather forecasting, we may characterize the current state of knowledge in software forecasting as the gathering of portents. While these may be useful and sometimes decisive in project management, they are prescientific and qualitative. Further, it seems very unlikely that the portents can be developed into a useful theory of forecasting. To develop scientific forecasting tools, a rational way of predicting the future from historical primary data is required. It is also important that the primary data and the measurements used to obtain it satisfy some basic methodological requirements -- for example, the hypotheses developed from the measurements should be meaningful in the sense implied by measurement theory. The statistical approach, seeking to predict future events on the basis of historical patterns, seems to be an attractive short range approach to the forecasting problem. The goal of the exact method is to be able to apply largescale computation to many micropredictions to synthesize a quantitative forecast
A system architecture to support a verifiably secure multilevel security system by George Davida( Book )

4 editions published in 1980 in English and Undetermined and held by 3 WorldCat member libraries worldwide

Technology that allows significant sharing of computer resources carriers with it an increased responsibility to protect these resources from unauthorized, malicious, irresponsible, or unintended use or disclosure. The years have seen a progression of increasingly sensitive information made available in increasingly less supervised modes to a variety of users. Commercial users routinely store valuable financial information and conduct cashless transactions electronically. University professors maintain class grading forms and examinations on departmental computers. Government agencies keep extensive databases of sensitive information regarding employees, foreign nationals, U.S. citizens. The military and intelligence communities continue to press for more powerful techniques to enhance their information gathering and processing capabilities. In spite of the clear need for guarantees of security, all practical schemes to protect information stored or manipulated by such systems are either seriously flawed or reduce ultimately to a collection of physical security protocols
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.49 (from 0.02 for Abelard to ... to 0.95 for A Construc ...)

Abelard to Apple : the fate of American colleges and universitiesAbelard to Apple : the fate of American colleges and universities in the twenty-first century
Alternative Names
DeMillo, R. A.

DeMillo, Richard Allan 1947-

Millo, Richard de 1947-

Richard DeMillo American academic

Languages
English (113)

Covers
Abelard to Apple : the fate of American colleges and universities in the twenty-first century