Sciweavers

669 search results - page 83 / 134
» Managing the Risk of IT Outsourcing
Sort
View
ICECCS
2000
IEEE
126views Hardware» more  ICECCS 2000»
15 years 2 months ago
Domain Modeling of Software Process Models
This paper presents a novel application involving two important Software Engineering research areas: process modeling and software reuse. The Spiral Model is a risk-driven process...
Hassan Gomaa, Larry Kerschberg, Ghulam A. Farrukh
AUTOMATICA
2006
101views more  AUTOMATICA 2006»
14 years 10 months ago
A risk-sensitive approach to total productive maintenance
While risk-sensitive (RS) approaches for designing plans of total productive maintenance are critical in manufacturing systems, there is little in the literature by way of theoret...
Abhijit Gosavi
COMCOM
2007
83views more  COMCOM 2007»
14 years 10 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
XPU
2007
Springer
15 years 4 months ago
A Case Study of the Implementation of Agile Methods in a Bioinformatics Project
From July 2005 to August 2006, a bioinformatics project experienced a substantial transformation by adopting Scrum and some XP practices. The paper reveals project risks, previous ...
Xueling Shu, Andrei L. Turinsky, Christoph W. Sens...
IWAN
1999
Springer
15 years 2 months ago
The Impact of Active Networks on Established Network Operators
A collaborative case based study has established that Active Networks will have a very significant impact on Network operators. Active Networking appears to be the only route to a...
Arto Juhola, Ian Marshall, Stefan Covaci, Thomas V...