Sciweavers

1412 search results - page 26 / 283
» The Value of Outsourced Software
Sort
View
AUIC
2006
IEEE
14 years 2 months ago
From pushing buttons to play and progress: value and interaction in fable
A value can be understood as a belief that one mode of conduct is preferable to others. The user-interface of computer games mediates all player conduct in the game and is therefo...
Pippin Barr, James Noble, Robert Biddle, Rilla Kha...
ARCS
2006
Springer
14 years 14 days ago
Do Trace Cache, Value Prediction and Prefetching Improve SMT Throughput?
While trace cache, value prediction, and prefetching have been shown to be effective in the single-threaded superscalar, there has been no analysis of these techniques in a Simulta...
Chen-Yong Cher, Il Park, T. N. Vijaykumar
AGILEDC
2007
IEEE
14 years 3 months ago
A Strategy for Balancing Business Value and Story Size
What would your Analyst team do when torn between meeting Customer versus Developer demands? When their needs conflict with one another, how do you appease them both? The report o...
Hai Ton
ECBS
2008
IEEE
121views Hardware» more  ECBS 2008»
14 years 3 months ago
Agile Release Planning: Dealing with Uncertainty in Development Time and Business Value
Release planning is a critical activity in the software development process. The creation of a clear and realistic plan is extremely difficult, as key factors such as time and cos...
Kevin Logue, Kevin McDaid
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard