Sciweavers

4923 search results - page 132 / 985
» Software Risk Management
Sort
View
AGILEDC
2007
IEEE
14 years 3 months ago
Agile Program Management: Lessons Learned from the VeriSign Managed Security Services Team
This report examines how the VeriSign Managed Security Services team (MSS) has successfully extended agile software development practices to deal with a complex, multi-product dev...
Peter Hodgkins, Luke Hohmann
TRIDENTCOM
2008
IEEE
14 years 3 months ago
Performance analysis of a lightweight NEMO implementation for low-end devices
IETF Network Mobility (NEMO) Basic Support Protocol is an IP mobility management protocol designed to provide seamless IP mobility to complete networks. This protocol is of crucia...
J. L. Almodovar, Antonio de la Oliva, C. Lazo Ram,...
DIM
2007
ACM
14 years 27 days ago
Implementing identity provider on mobile phone
We have implemented an identity provider (IdP), which is defined by the Liberty Alliance on a mobile phone. We propose an authentication method, which uses this personal IdP as a ...
Tsuyoshi Abe, Hiroki Itoh, Kenji Takahashi
EUROMICRO
2004
IEEE
14 years 20 days ago
Integrity Management in Component Based Systems
There is a need for mechanisms for maintaining and restoring software integrity on deployed systems. Dynamic replacement, removal and addition of components in deployed systems is...
Johan Muskens, Michel R. V. Chaudron
INFSOF
2010
95views more  INFSOF 2010»
13 years 7 months ago
Characterizing software architecture changes: A systematic review
With today’s ever increasing demands on software, software developers must produce software that can be changed without the risk of degrading the software architecture. One way ...
Byron J. Williams, Jeffrey C. Carver