Sciweavers

102 search results - page 14 / 21
» A study of information systems outsourcing risks
Sort
View
CHIMIT
2009
ACM
14 years 1 months ago
Scripting practices in complex systems management
System administrators are end-users too. And as end-users, they develop tools, create web pages, write command-line scripts, use spreadsheets, and repurpose existing tools. In sho...
Eser Kandogan, Paul P. Maglio, Eben M. Haber, John...
IEEECIT
2010
IEEE
13 years 5 months ago
Model-Level Debugging of Embedded Real-Time Systems
Abstract—Model-driven development has become the stateof-the-art approach for designing embedded real-time systems. heir high level of abstraction, models are easier to understan...
Wolfgang Haberl, Markus Herrmannsdoerfer, Jan Birk...
COMCOM
2010
133views more  COMCOM 2010»
13 years 7 months ago
Measuring long-term location privacy in vehicular communication systems
Vehicular communication systems are an emerging form of communication that enables new ways of cooperation among vehicles, traffic operators, and service providers. However, many ...
Zhendong Ma, Frank Kargl, Michael Weber
IWPC
1999
IEEE
13 years 11 months ago
Reconstructing Ownership Architectures To Help Understand Software Systems
Recent research suggests that large software systems should have a documented system architecture. One form of documentation that may help describe the structure of software syste...
Ivan T. Bowman, Richard C. Holt
HICSS
2008
IEEE
134views Biometrics» more  HICSS 2008»
14 years 1 months ago
Simplified Use Case Driven Approach (SUCADA) for Conversion of Legacy System to COTS Package
The conversion of a legacy system to a system based on a commercial-off-the-shelf (COTS) package demands a dedicated guidance. The assumption that it is just a matter of adopting ...
Jose D. Montero, YongSeog Kim, Jeff Johnson