Sciweavers

2588 search results - page 475 / 518
» Project risk management
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
BorderPatrol: isolating events for black-box tracing
Causal request traces are valuable to developers of large concurrent and distributed applications, yet difficult to obtain. Traces show how a request is processed, and can be anal...
Eric Koskinen, John Jannotti
OOPSLA
2009
Springer
14 years 2 months ago
Towards automation of iteration planning
Iterations are time-boxed periods with an intended outcome that is often a set of implemented requirements. Iterations are part of most common software development lifecycle model...
Jonas Helming, Maximilian Koegel, Zardosht Hodaie
MOBIQUITOUS
2008
IEEE
14 years 2 months ago
How to edit gigabyte XML files on a mobile phone with XAS, RefTrees, and RAXS
The Open Source mobility middleware developed in the Fuego Core project provides a stack for efficient XML processing on limited devices. Its components are a persistent map API, ...
Tancred Lindholm, Jaakko Kangasharju
ICC
2007
IEEE
184views Communications» more  ICC 2007»
14 years 1 months ago
A 3GPP-IMS Based Approach for Converging Next Generation Mobile Data Networks
— This paper presents a promising architecture for of the 3GPP’s IMS for supporting real-time session negotiation converging third-generation (3G) cellular data networks and an...
Kumudu S. Munasinghe, Abbas Jamalipour
CCS
2007
ACM
14 years 1 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...