Sciweavers

3555 search results - page 624 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
BNCOD
2007
103views Database» more  BNCOD 2007»
15 years 2 months ago
Automation Everywhere: Autonomics and Data Management
Traditionally, database management systems (DBMSs) have been associated with high-cost, high-quality functionalities. That is, powerful capabilities are provided, but only in respo...
Norman W. Paton
DGO
2007
104views Education» more  DGO 2007»
15 years 2 months ago
Advancing return on investment analysis for government information technology
The Center for Technology in Government (CTG) in collaboration with SAP, the business software solutions provider to public sector organizations, conducted a research project focu...
Anthony M. Cresswell, Theresa A. Pardo, G. Brian B...
ICIS
2000
15 years 2 months ago
The politics of IS evaluation: a social shaping perspective
A considerable amount of research has already been conducted in the IT/IS evaluation arena, yet rewards remain elusive. This has been variously explained and in this paper we aim ...
Melanie Wilson, Debra Howcroft
AIEDU
2005
68views more  AIEDU 2005»
15 years 1 months ago
Software Patterns in ITS Architectures
The paper discusses ITS architectures in terms of patterns that exist within them. The concept of patterns has received surprisingly little attention so far from researchers in the...
Vladan Devedzic, Andreas Harrer
IJSS
2007
82views more  IJSS 2007»
15 years 1 months ago
A holistic method for finding out critical features of industry maintenance services
— The purpose of this case study is to create a competitive operative management system for efficiency and quality performance for a company running maintenance service business ...
Juha-Matti Ranta, Josu Takala