Sciweavers

4349 search results - page 187 / 870
» A Comprehensive Process Model for Studying Software Process ...
Sort
View
98
Voted
HICSS
2003
IEEE
110views Biometrics» more  HICSS 2003»
15 years 8 months ago
The Research on the Policy Information System: A Case Study of National Health Insurance Policy in Taiwan
A wrong policy is far worse than corruption. It goes without saying that making good policies has its substantial importance and influence. It is assumed that policy information s...
Yu-Ying Ku
126
Voted
HICSS
2007
IEEE
165views Biometrics» more  HICSS 2007»
15 years 5 months ago
A Study on Developing CRM Scorecard
As more firms embrace CRM as a core business strategy, it is getting more important to assess firms’ CRM readiness and performance for diagnosing, guiding, managing, and evaluat...
Hyung-Su Kim, Young-Gul Kim
DBISP2P
2006
Springer
185views Database» more  DBISP2P 2006»
15 years 7 months ago
Answering Constrained k-NN Queries in Unstructured P2P Systems
The processing of k-NN queries has been studied extensively both in a centralized computing environment and in a structured P2P environment. However, the problem over an unstructur...
Bin Wang, Xiaochun Yang, Guoren Wang, Lei Chen 000...
MODELS
2007
Springer
15 years 9 months ago
Model-Driven Engineering for Software Migration in a Large Industrial Context
As development techniques, paradigms and platforms evolve far more quickly than domain applications, software modernization and migration, is a constant challenge to software engin...
Franck Fleurey, Erwan Breton, Benoit Baudry, Alain...
155
Voted
ESEM
2010
ACM
15 years 1 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams