J
John Grundy
Researcher at Monash University
Publications - 618
Citations - 11834
John Grundy is an academic researcher from Monash University. The author has contributed to research in topics: Computer science & Software development. The author has an hindex of 47, co-authored 545 publications receiving 9395 citations. Previous affiliations of John Grundy include University of Auckland & Queen's University.
Papers
More filters
Journal ArticleDOI
Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review
TL;DR: A systematic literature review of empirical studies that investigated factors affecting the effectiveness of pair programming for CS/SE students and studies that measured the effectiveness, showing two clear gaps in this research field, showed a lack of studies focusing on pair compatibility factors aimed at making PP an effective pedagogical tool.
Posted Content
An Analysis of the Cloud Computing Security Problem
TL;DR: A detailed analysis of the cloud security problem is introduced and key features that should be covered by any proposed security solution are derived.
Book ChapterDOI
Optimal Edge User Allocation in Edge Computing with Variable Sized Vector Bin Packing
TL;DR: This paper model the edge user allocation (EUA) problem as a bin packing problem, and introduces a novel, optimal approach to solving the EUA problem based on the Lexicographic Goal Programming technique.
Proceedings Article
An analysis of the cloud computing security problem
TL;DR: In this article, the authors introduce a detailed analysis of the cloud security problem, and derive a detailed specification of the Cloud security problem and key features that should be covered by any proposed security solution.
Proceedings ArticleDOI
Collaboration-Based Cloud Computing Security Management Framework
TL;DR: A new cloud security management framework based on aligning the FISMA standard to fit with the cloud computing model, enabling cloud providers and consumers to be security certified, and is built on top of a number of security standards that assist in automating the security management process.