Sciweavers

2588 search results - page 197 / 518
» Project risk management
Sort
View
PERCOM
2010
ACM
15 years 2 months ago
Privacy Butler: A personal privacy rights manager for online presence
Abstract—The online presence projected by a person is comprised of all the information about them available on the Internet. In online communities and social networking services,...
Ryan Wishart, Domenico Corapi, Anil Madhavapeddy, ...
123
Voted
ISSRE
2008
IEEE
15 years 10 months ago
Cost Curve Evaluation of Fault Prediction Models
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Yue Jiang, Bojan Cukic, Tim Menzies
148
Voted
HICSS
2007
IEEE
183views Biometrics» more  HICSS 2007»
15 years 10 months ago
Rescuing Small and Medium-Sized Enterprises from Inefficient Information Systems - A Multi-disciplinary Method for ERP System Re
Enterprise resource planning (ERP) systems integrate companies’ multiple information systems and help adapt best practices for business processes. ERP systems are in most cases ...
Inka Vilpola, Ilkka Kouri, Kaisa Vään&au...
109
Voted
HICSS
2003
IEEE
121views Biometrics» more  HICSS 2003»
15 years 9 months ago
Repeatable Quality Assurance Techniques for Requirements Negotiations
Many software projects fail because early life-cycle defects such as ill-defined requirements are not identified and removed. Therefore, quality assurance (QA) techniques for defe...
Paul Grünbacher, Michael Halling, Stefan Biff...
178
Voted
CLEIEJ
2007
203views more  CLEIEJ 2007»
15 years 3 months ago
Optimization Criteria for Effort Estimation using Fuzzy Technique
Effective cost estimation is the most challenging activity in software development. Software cost estimation is not an exact science. Cost estimation process involves a series of ...
Harish Mittal, Pradeep Bhatia