Sciweavers

909 search results - page 134 / 182
» The impacts of software product management
Sort
View
EUROSEC
2008
ACM
13 years 9 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
IADIS
2008
13 years 9 months ago
Data Mining Applications in Intelligent Integrated Development Environments
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 8 months ago
Examining Requirements Change Rework Effort: A Study
Although software managers are generally good at new project estimation, their experience of scheduling rework tends to be poor. Inconsistent or incorrect effort estimation can in...
Bee Bee Chua, June M. Verner
ECWEB
2010
Springer
179views ECommerce» more  ECWEB 2010»
13 years 6 months ago
Concession Behaviour in Automated Negotiation
Traditional negotiation, conducted face-to-face and via mail or telephone, is often difficult to manage, prone to misunderstanding, and time consuming. Automated negotiation promis...
Fernando Lopes, Helder Coelho
SIGSOFT
2007
ACM
14 years 8 months ago
Which warnings should I fix first?
Automatic bug-finding tools have a high false positive rate: most warnings do not indicate real bugs. Usually bug-finding tools assign important warnings high priority. However, t...
Sunghun Kim, Michael D. Ernst