scispace - formally typeset
J

John Grundy

Researcher at Monash University

Publications -  618
Citations -  11834

John Grundy is an academic researcher from Monash University. The author has contributed to research in topics: Computer science & Software development. The author has an hindex of 47, co-authored 545 publications receiving 9395 citations. Previous affiliations of John Grundy include University of Auckland & Queen's University.

Papers
More filters
Journal ArticleDOI

Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review

TL;DR: A systematic literature review of empirical studies that investigated factors affecting the effectiveness of pair programming for CS/SE students and studies that measured the effectiveness, showing two clear gaps in this research field, showed a lack of studies focusing on pair compatibility factors aimed at making PP an effective pedagogical tool.
Posted Content

An Analysis of the Cloud Computing Security Problem

TL;DR: A detailed analysis of the cloud security problem is introduced and key features that should be covered by any proposed security solution are derived.
Book ChapterDOI

Optimal Edge User Allocation in Edge Computing with Variable Sized Vector Bin Packing

TL;DR: This paper model the edge user allocation (EUA) problem as a bin packing problem, and introduces a novel, optimal approach to solving the EUA problem based on the Lexicographic Goal Programming technique.
Proceedings Article

An analysis of the cloud computing security problem

TL;DR: In this article, the authors introduce a detailed analysis of the cloud security problem, and derive a detailed specification of the Cloud security problem and key features that should be covered by any proposed security solution.
Proceedings ArticleDOI

Collaboration-Based Cloud Computing Security Management Framework

TL;DR: A new cloud security management framework based on aligning the FISMA standard to fit with the cloud computing model, enabling cloud providers and consumers to be security certified, and is built on top of a number of security standards that assist in automating the security management process.