Sciweavers

708 search results - page 110 / 142
» Automated software development with XML and the Java* langua...
Sort
View
HICSS
2011
IEEE
252views Biometrics» more  HICSS 2011»
12 years 11 months ago
Hitting the Wall: What to Do When High Performing Scrum Teams Overwhelm Operations and Infrastructure
All-at-once Scrum implementations require total commitment to change, high level management support and aggressive removal of impediments. Several company-wide implementations are...
Jeff Sutherland, Robert Frohman
ACMICEC
2004
ACM
205views ECommerce» more  ACMICEC 2004»
14 years 1 months ago
M-Modeler: a framework implementation for modeling m-commerce applications
At the present time, the use of mobile technology in business, is becoming an opportunity to generate competitive advantages within organization environments. Mobile technology he...
Ana Hilda Morales-Aranda, Oscar Mayora-Ibarra, San...
ITNG
2008
IEEE
14 years 1 months ago
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns
We propose the characteristics of a software tool that leverages specifying attack pattern details in understandable hierarchies. These hierarchies are currently manually populate...
Joshua J. Pauli, Patrick Henry Engebretson
PASTE
2010
ACM
13 years 9 months ago
Null dereference analysis in practice
Many analysis techniques have been proposed to determine when a potentially null value may be dereferenced. But we have observed in practice that not every potential null derefere...
Nathaniel Ayewah, William Pugh
GPCE
2009
Springer
14 years 5 days ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...