Sciweavers

669 search results - page 76 / 134
» How to Have a Successful Free Software Project
Sort
View
ACSAC
1998
IEEE
15 years 6 months ago
Protecting Web Servers from Security Holes in Server-Side Includes
This paper first investigates and analyzes security holes concerning the use of Server-Side Includes (SSI) in some of the most used Web server software packages. We show that, by ...
Jared Karro, Jie Wang
HICSS
2010
IEEE
173views Biometrics» more  HICSS 2010»
15 years 8 months ago
Analysis of Stakeholder/Value Dependency Patterns and Process Implications: A Controlled Experiment
Different classes of information system stakeholders depend on different values to be successful. Understanding stakeholders’ value dependencies is critical for developing softw...
Di Wu, Qi Li, Mei He, Barry W. Boehm, Ye Yang, Sup...
ECIS
2001
15 years 3 months ago
Avoiding Failure in SPI Initiation
Software Process Improvement (SPI) is a recognised systematic approach for improving the capability of software organisations. Such initiatives have met with a number of difficult...
Pouya Pourkomeylian
STTT
1998
130views more  STTT 1998»
15 years 1 months ago
The Practitioner's Guide to Coloured Petri Nets
Abstract. Coloured Petri nets (CP-nets or CPNs) provide a framework for the design, specification, validation, and verification of systems. CP-nets have a wide range of applicati...
Lars Michael Kristensen, Søren Christensen,...
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
15 years 8 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson