Sciweavers

7835 search results - page 50 / 1567
» Software are Processes Too
Sort
View
SP
1999
IEEE
155views Security Privacy» more  SP 1999»
14 years 2 months ago
Software Smart Cards via Cryptographic Camouflage
A sensitive point in public key cryptography is how to protect the private key. We outline a method of protecting private keys using cryptographic camouflage. Specifically, we do ...
Douglas N. Hoover, B. N. Kausik
MISQ
2000
123views more  MISQ 2000»
13 years 9 months ago
A Cross-Cultural Study on Escalation of Commitment Behavior in Software Projects
One of the most challenging decisions that a manager must confront is whether to continue or abandon a troubled project. Published studies suggest that failing software projects a...
Mark Keil, Bernard C. Y. Tan, Kwok Kee Wei, Timo S...
ISPW
2010
IEEE
14 years 2 months ago
Software Process Model Blueprints
Abstract. Explicitly defining a software process model is widely recognized as a good software engineering practice. However, having a defined process does not necessarily mean tha...
Julio Ariel Hurtado Alegria, Alejandro Lagos, Alex...
NGITS
1999
Springer
14 years 2 months ago
From Object-Process Diagrams to a Natural Object-Process Language
As the requirements for system analysis and design become more complex, the need for a natural, yet formal way of specifying system analysis findings and design decisions are becom...
Mor Peleg, Dov Dori
SOPR
1998
117views more  SOPR 1998»
13 years 9 months ago
Software processes: a retrospective and a path to the future
Software engineering focuses on producing quality software products through quality processes. The attention to processes dates back to the early 70’s, when software engineers r...
Gianpaolo Cugola, Carlo Ghezzi