Sciweavers

5843 search results - page 205 / 1169
» Software Security in Practice
Sort
View
123
Voted
WICSA
2008
15 years 6 months ago
Evaluating the Software Architecture Competence of Organizations
An organization is architecturally competent if it has the ability to acquire, use and sustain the skills and knowledge necessary to carry out architecture-related practices that ...
Len Bass, Paul C. Clements, Rick Kazman, Mark Klei...
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 11 months ago
Bridge Methods: Using a Balanced Project Practice Portfolio to Integrate Agile and Formal Process Methodologies
This paper examines the non-linear nature of progress on software projects. It asserts that this uneven accomplishment stems from the continuous need to drive value quickly in res...
Stephen J. Cohen, William H. Money
PODS
2004
ACM
189views Database» more  PODS 2004»
16 years 5 months ago
The Lixto Data Extraction Project - Back and Forth between Theory and Practice
We present the Lixto project, which is both a research project in database theory and a commercial enterprise that develops Web data extraction (wrapping) and Web service definiti...
Georg Gottlob, Christoph Koch, Robert Baumgartner,...
ATAL
2009
Springer
15 years 11 months ago
Bounded practical social reasoning in the ESB framework
Reasoning about others, as performed by agents in order to coordinate their behaviours with those of others, commonly involves forming and updating beliefs about hidden system pro...
Iain Wallace, Michael Rovatsos
ESAW
2007
Springer
15 years 11 months ago
Multi-agent Simulation to Implementation: A Practical Engineering Methodology for Designing Space Flight Operations
OCAMS is a practical engineering application of multi-agent systems technology, involving redesign of the tools and practices in a complex, distributed system. OCAMS is designed to...
William J. Clancey, Maarten Sierhuis, Chin Seah, C...