Sciweavers

669 search results - page 120 / 134
» Managing the Risk of IT Outsourcing
Sort
View
CSREASAM
2004
13 years 9 months ago
A Unified Framework for Mobile Device Security
: Present-day handheld devices, such as PDAs, are a useful blend of hardware and software oriented toward the mobile workforce. While they provide the capability to review document...
Wayne A. Jansen, Serban I. Gavrila, Vlad Korolev
IJCAI
1997
13 years 9 months ago
Aggregating Features and Matching Cases on Vague Linguistic Expressions
Decision making based on the comparison of multiple criteria of two or more alternatives, is the subject of intensive research. In many decision making situations, a single criter...
Alfons Schuster, Werner Dubitzky, Philippe Lopes, ...
SIGMOD
2010
ACM
249views Database» more  SIGMOD 2010»
13 years 8 months ago
Worry-free database upgrades: automated model-driven evolution of schemas and complex mappings
Schema evolution is an unavoidable consequence of the application development lifecycle. The two primary schemas in an application, the client conceptual object model and the pers...
James F. Terwilliger, Philip A. Bernstein, Adi Unn...
ANOR
2007
180views more  ANOR 2007»
13 years 8 months ago
Ethics in OR/MS: past, present and future
Abstract The pervasiveness and impact on society and on every day human life of technology has led to a growing awareness that science and technology cannot be considered above or ...
Jean-Pierre Brans, Giorgio Gallo
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 8 months ago
Examining Requirements Change Rework Effort: A Study
Although software managers are generally good at new project estimation, their experience of scheduling rework tends to be poor. Inconsistent or incorrect effort estimation can in...
Bee Bee Chua, June M. Verner