Sciweavers

806 search results - page 85 / 162
» A Practitioners
Sort
View
HICSS
2008
IEEE
187views Biometrics» more  HICSS 2008»
14 years 5 months ago
Relational Risk Mitigation: The Relationship Approach to Mitigating Risks in Business Process Outsourcing
Managing risks in outsourcing has been widely researched but is still not fully understood by either academics or practitioners. Recent research on IS outsourcing relationships ha...
Kim Wüllenweber, Stefanie Jahner, Helmut Krcm...
HICSS
2008
IEEE
145views Biometrics» more  HICSS 2008»
14 years 5 months ago
Leadership Roles and Communication Issues in Partially Distributed Emergency Response Software Development Teams: A Pilot Study
Emergencies often require interorganizational and/or international coordination for effective planning and response. Therefore, planning and response teams are often configured as...
Linda Plotnick, Rosalie J. Ocker, Starr Roxanne Hi...
ICSM
2008
IEEE
14 years 5 months ago
Quota-constrained test-case prioritization for regression testing of service-centric systems
Test-case prioritization is a typical scenario of regression testing, which plays an important role in software maintenance. With the popularity of Web Services, integrating Web S...
Shan-Shan Hou, Lu Zhang, Tao Xie, Jiasu Sun
IWNAS
2008
IEEE
14 years 5 months ago
Accurate Performance Modeling and Guidance to the Adoption of an Inconsistency Detection Framework
With the increased popularity of replica-based services in distributed systems such as the Grid, consistency control among replicas becomes more and more important. To this end, I...
Yijun Lu, Xueming Li, Hong Jiang
SADFE
2008
IEEE
14 years 5 months ago
Computer Forensics in Forensis
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about ...
Sean Peisert, Matt Bishop, Keith Marzullo