Sciweavers

669 search results - page 133 / 134
» Managing the Risk of IT Outsourcing
Sort
View
BMCBI
2010
156views more  BMCBI 2010»
13 years 6 months ago
Estimating the individualized HIV-1 genetic barrier to resistance using a nelfinavir fitness landscape
Background: Failure on Highly Active Anti-Retroviral Treatment is often accompanied with development of antiviral resistance to one or more drugs included in the treatment. In gen...
Kristof Theys, Koen Deforche, Gertjan Beheydt, Yve...
JITECH
2007
92views more  JITECH 2007»
13 years 6 months ago
Modernization of passenger reservation system: Indian Railways' dilemma
This teaching case discusses the challenges being faced by the technology managers at Indian Railways (IR) in the current scenario of a resurgent national economy coupled with inc...
Shirish C. Srivastava, Sharat S. Mathur, Thompson ...
AC
2004
Springer
13 years 6 months ago
The Timeboxing process model for iterative software development
In today's business where speed is of essence, an iterative development approach that allows the functionality to be delivered in parts has become a necessity and an effectiv...
Pankaj Jalote, Aveejeet Palit, Priya Kurien
CN
1999
106views more  CN 1999»
13 years 5 months ago
UIML: An Appliance-Independent XML User Interface Language
Today's Internet appliances feature user interface technologies almost unknown a few years ago: touch screens, styli, handwriting and voice recognition, speech synthesis, tin...
Marc Abrams, Constantinos Phanouriou, Alan L. Bato...
PVLDB
2010
172views more  PVLDB 2010»
13 years 4 months ago
Secure Personal Data Servers: a Vision Paper
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on in...
Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yan...