Sciweavers

4923 search results - page 136 / 985
» Software Risk Management
Sort
View
FECS
2010
1324views Education» more  FECS 2010»
13 years 7 months ago
A Case Study in the Design of a Restaurant Management System
Teaching software engineering at the undergraduate level is an exciting and challenging undertaking. Students come to software engineering with a variety of technical and sift ski...
Wesley Williams, Devon Simmonds
SCM
2003
13 years 10 months ago
Integrating Software Construction and Software Deployment
Classically, software deployment is a process consisting of building the software, packaging it for distribution, and installing it at the target site. This approach has two proble...
Eelco Dolstra
ICDCS
2010
IEEE
14 years 26 days ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
BMCBI
2008
143views more  BMCBI 2008»
13 years 9 months ago
catmap: Case-control And TDT Meta-Analysis Package
Background: Risk for complex disease is thought to be controlled by multiple genetic risk factors, each with small individual effects. Meta-analyses of several independent studies...
Kristin K. Nicodemus
RE
2010
Springer
13 years 3 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa