Sciweavers

4923 search results - page 136 / 985
» Software Risk Management
Sort
View
186
Voted
FECS
2010
1324views Education» more  FECS 2010»
15 years 23 days ago
A Case Study in the Design of a Restaurant Management System
Teaching software engineering at the undergraduate level is an exciting and challenging undertaking. Students come to software engineering with a variety of technical and sift ski...
Wesley Williams, Devon Simmonds
SCM
2003
15 years 4 months ago
Integrating Software Construction and Software Deployment
Classically, software deployment is a process consisting of building the software, packaging it for distribution, and installing it at the target site. This approach has two proble...
Eelco Dolstra
98
Voted
ICDCS
2010
IEEE
15 years 6 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
106
Voted
BMCBI
2008
143views more  BMCBI 2008»
15 years 2 months ago
catmap: Case-control And TDT Meta-Analysis Package
Background: Risk for complex disease is thought to be controlled by multiple genetic risk factors, each with small individual effects. Meta-analyses of several independent studies...
Kristin K. Nicodemus
131
Voted
RE
2010
Springer
14 years 9 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa