Sciweavers

57 search results - page 10 / 12
» Research on CMMI-based Software Process Metrics
Sort
View
IDTRUST
2010
ACM
14 years 5 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
DAC
2004
ACM
14 years 11 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
CASCON
1996
99views Education» more  CASCON 1996»
14 years 5 days ago
Modeling and analysis of the Unix communication subsystems
The performance of host communication subsystems is an important research topic in computer networks.1 Performance metrics such as throughput, delay, and packet loss are important...
Yi-Chun Chu, Toby J. Teorey
PROFES
2004
Springer
14 years 4 months ago
Effort Estimation Based on Collaborative Filtering
Effort estimation methods are one of the important tools for project managers in controlling human resources of ongoing or future software projects. The estimations require histori...
Naoki Ohsugi, Masateru Tsunoda, Akito Monden, Ken-...
ESEM
2008
ACM
14 years 18 days ago
Evaluation of capture-recapture models for estimating the abundance of naturally-occurring defects
Project managers can use capture-recapture models to manage the inspection process by estimating the number of defects present in an artifact and determining whether a reinspectio...
Gursimran Singh Walia, Jeffrey C. Carver