Sciweavers

5843 search results - page 172 / 1169
» Software Security in Practice
Sort
View
HICSS
2007
IEEE
132views Biometrics» more  HICSS 2007»
15 years 11 months ago
Using Agile Practices to Spark Innovation in a Small to Medium Sized Business
The media industry is challenged to find new lines of business as technology redefines content, distribution and customer expectations. This is a case study of Oxygen Media where ...
Ken H. Judy, Ilio Krumins-Beens
SEW
2007
IEEE
15 years 10 months ago
Mapping CMMI Project Management Process Areas to SCRUM Practices
- Over the past years, the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been broadly used for assessing organizational maturity and process...
Ana Sofia C. Marcal, Felipe Santana Furtado Soares...
CGO
2005
IEEE
15 years 10 months ago
Practical and Accurate Low-Level Pointer Analysis
Pointer analysis is traditionally performed once, early in the compilation process, upon an intermediate representation (IR) with source-code semantics. However, performing pointe...
Bolei Guo, Matthew J. Bridges, Spyridon Triantafyl...
PLDI
2004
ACM
15 years 10 months ago
The set constraint/CFL reachability connection in practice
Many program analyses can be reduced to graph reachability problems involving a limited form of context-free language reachability called Dyck-CFL reachability. We show a new redu...
John Kodumal, Alexander Aiken
ISESE
2002
IEEE
15 years 9 months ago
Verification and Validation in Industry -- A Qualitative Survey on the State of Practice
Verification and validation activities take a substantial share of project budgets and need improvements. This is an accepted truth, but the current practices are seldom assessed ...
Carina Andersson, Per Runeson