—In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements sinc...
Organisations that follow the CMM-road towards software process improvement tend to spend large amounts of money and effort. This is certainly the case in the company ING which le...
Rob J. Kusters, Jos J. M. Trienekens, Wilmar Hasso...
The core of the new product development [NPD] process centers on knowledge creation, utilization and the management of knowledge. This manuscript uses a software firm case to esta...
The difficult business reality today makes enterprises more and more resort to information technology to manage nearly everything within the enterprises and to conduct business ac...
— Internet traffic is bursty and network servers are often overloaded with surprising events or abnormal client request patterns. This paper studies scheduling algorithms for in...