Sciweavers

4923 search results - page 142 / 985
» Software Risk Management
Sort
View
ESE
2008
112views Database» more  ESE 2008»
13 years 10 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
14 years 3 months ago
Designing Complex Software Implementation Programs
The central question of this paper is: How can design of Program Management contribute to the success of complex software implementations? Incomplete goal specifications, lack of ...
Pieter M. A. Ribbers, Klaus-Clemens Schoo
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 10 months ago
Discovering significant rules
In many applications, association rules will only be interesting if they represent non-trivial correlations between all constituent items. Numerous techniques have been developed ...
Geoffrey I. Webb
HICSS
2009
IEEE
135views Biometrics» more  HICSS 2009»
14 years 4 months ago
Building Leadership for Life Cycle Business Transition by Hybrid Innovation
Manufacturing companies that are expanding their product offering to cover also lifecycle services in the customers’ facilities are facing the increasing complexity and risk to ...
Vesa Salminen
DAC
2001
ACM
14 years 11 months ago
Hardware/Software Instruction Set Configurability for System-on-Chip Processors
New application-focused system-on-chip platforms motivate new application-specific processors. Configurable and extensible processor architectures offer the efficiency of tuned lo...
Albert Wang, Earl Killian, Dror E. Maydan, Chris R...