Towards Bridging the Gap between CMMI and Agile Development Methodologies (Englisch)
- Neue Suche nach: Gazzan, M.
- Neue Suche nach: Shaikh, A.
- Neue Suche nach: Gazzan, M.
- Neue Suche nach: Shaikh, A.
- Neue Suche nach: Goto, T.
In:
Computer applications in industry and engineering; (CAINE-2014)
;
299-304
;
2014
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Towards Bridging the Gap between CMMI and Agile Development Methodologies
-
Beteiligte:
-
Kongress:International Conference; 27th, Computer applications in industry and engineering; (CAINE-2014) ; 2014 ; New Orleans, LA
-
Erschienen in:
-
Verlag:
- Neue Suche nach: International Society for Computers and Their Applications
-
Erscheinungsort:Cary, NC
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:6 pages
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Oodles of Moodles and More: Does the Flipped Classroom Format Really Improve Learning?Lee, G. et al. | 2014
- 3
-
Handling Abnormal Microarray ImagesHuang, C.-Y. et al. | 2014
- 9
-
Development of Health Diagnostics Based on Personalized Medical ModelsHudson, S. / Cohen, M. / Hudson, D. et al. | 2014
- 15
-
NeoCortical Builder: A Web Based Front End for NCSBerlinski, J. / Chavez, M. / Rowe, C. / Jordan, N. / Tanna, D. / Hoang, R. / Dascalu, S. / Harris, F.C. / Bray, L.C.J. et al. | 2014
- 21
-
Systematic Coronary Risk Evaluation through Artificial Neural Networks based SystemsRodrigues, B. / Gomes, S. / Vicente, H. / Abelha, A. / Novais, P. / Machado, J. / Neves, J. et al. | 2014
- 27
-
Applications of Machine Learning in Cyber SecurityFord, V. / Siraj, A. et al. | 2014
- 33
-
Perturbing Information Security Policy Statements using Deviational AnalysisSrivatanakul, T. et al. | 2014
- 39
-
Refinement of XACML Implementation on Role-Based Access ControlO brien, S. / Jin, Y. / Sorley, T. et al. | 2014
- 45
-
Simulation and Performance Analysis of Stadium Crowd EvacuationZarket, M. / Aldana, N. / Fox, C. / Diehl, E. / Dimitoglou, G. et al. | 2014
- 53
-
Towards Mechanistically Explanatory Biomimetic Analogs for Fracture HealingMarmor, M. / Bahney, C. / Hunt, C.A. et al. | 2014
- 59
-
Introducing Cloud Database Management in Undergraduate CurriculumJin, Y. / Li, J. et al. | 2014
- 65
-
Incorporating AI Topics in Game Programming CourseLiu, Z. et al. | 2014
- 71
-
Students Teaching Students: A Long-Term, Team Based ProjectJohnson, T. / Stringfellow, C. / Musarurwa, S. et al. | 2014
- 77
-
Advancing Wireless Sensor Networks Performance over Radio Trigger Wake-Up CapabilitiesAlmajadub, F. / Elleithy, K. / Shaer, A. et al. | 2014
- 85
-
A Dynamic Clustering Algorithm for Object Tracking and Localization in WSNMusafer, H. / Abdulhameed, R. / Abdelfattah, E. / Elleithy, K. et al. | 2014
- 93
-
Developing Network Security Protocol by using Key Pre-Distribution for Wireless Sensor NetworkEltaeib, T. / Hassan, A. / Elleithy, K. et al. | 2014
- 97
-
Cost Analysis of 5th Generation TechnologyElmannai, W. / Elleithy, K. et al. | 2014
- 105
-
Optimized Cooperative Localization Technique Based on Linear Intersection over Wireless Sensor NetworksAlabbas, A. / Elleithy, K. et al. | 2014
- 113
-
Subject-dependent and Subject-independent Emotional Classification of CMAC-based Features using EFuNNYaacob, H. / Abdul, W. / Kamaruddin, N. et al. | 2014
- 119
-
Multi-Feature Criteria for Qualifying Hand Motion as a GestureMurphy, L. / Cheok, K.C. et al. | 2014
- 125
-
Analysis of EEG Signals using Mathematical Morphology Decomposition and Kurtosis: Detection of EpileptiformsHamal, A.Q. / Abdul, W. / Kamaruddin, N. et al. | 2014
- 131
-
A Concept of the Editing for Spreadsheets Based on Octgrids and SQLAnzai, K. / Anada, K. / Miyadera, Y. / Yaku, T. / Yokota, K. et al. | 2014
- 135
-
Node-to-set Disjoint Paths Routing in a Torus-connected Cycles NetworkBossard, A. / Kaneko, K. et al. | 2014
- 141
-
A Fault-tolerant Routing Algorithm based on Safety Levels in a Pancake GraphKaneko, K. et al. | 2014
- 147
-
Design of Structured Peer-to-Peer Networks Using Linear Diophantine EquationGupta, B. / Rahimi, S. / Koneru, S. / Liu, Z. et al. | 2014
- 151
-
An Agent Based Modelling for Huge Synchronized Task ProcessingTakahashi, S. / Matsuo, T. et al. | 2014
- 157
-
Simulating Cost-Efficient Bridge Designs with West Point Bridge DesignerHuang, A. / Wong, P. et al. | 2014
- 163
-
A System of Systems Approach to the Design of a Landing Gear System: A Case StudyEtschmaier, M. / Lee, G. et al. | 2014
- 169
-
Neuro-Cognitive Correlation of Memory Effectiveness and Emotional ArousalAlarabi, K. / Abdul, W. / Kamaruddin, N. et al. | 2014
- 175
-
Analysis of Dyslexic Children Dynamic Emotion Trajectory during Executive Function TasksKamaruddin, N. / Karim, I.A. / Abdul, W. et al. | 2014
- 181
-
LSR-Based Static Core Selection in Shared Tree MulticastingGupta, B. / Koneru, S. / Rahimi, S. et al. | 2014
- 187
-
MODBUS Protocol Fuzzing for Cyber-security Evaluation of Industrial Control SystemsSabraoui, M. / Hieb, J. / Graham, J. et al. | 2014
- 193
-
Piggy, A Tool for Rapid Prototyping, Testing, Monitoring, Protecting, and Logging of Network ApplicationsMeehan, J. et al. | 2014
- 199
-
Adaptive Modulation and Coding for Efficient Wireless Channel Capacity UtilisationBobbie, P.O. / Awuku-Asabere, W. et al. | 2014
- 207
-
Adoption of Social Networking Systems in Higher Education: a Comparison of Theoritical ModelsThongmak, M. et al. | 2014
- 215
-
Asynchronous Update on Out-of-Core Column-Store Databases Utilizing the Timestamped Binary Association TableYu, F. / Luo, C. / Hou, W.-C. / Jones, E.S. et al. | 2014
- 221
-
Containment Join in the Presence of Nested Data NodesLuo, C. / Yu, F. / Hou, W.-C. / He, S. et al. | 2014
- 227
-
Hybrid CPU Scheduling Algorithm (HSA)Martin, I. et al. | 2014
- 233
-
LTV System Estimation Using TV CumulantsAl-Shoshan, A.I. et al. | 2014
- 239
-
Framework for Static Video Summarization using Accumulated MechanismMushtaq, M. / Siddiqua, A. et al. | 2014
- 245
-
Feature Analysis for Content-Based Trademark RetrievalAires, S. / Freitas, C. / Oliveira, L. et al. | 2014
- 251
-
Bilingual 2D Barcode Encoding with High CapacityKhorsheed, M.S. / Al-Omari, H. et al. | 2014
- 257
-
Efficient Concurrent Processing of Separable 2-D Transforms in C++11Weiss, J. et al. | 2014
- 263
-
Efficient Checkpoint Creation for MPI-based HPC Application ProgramsKongmunvattana, A. et al. | 2014
- 269
-
Automatic Speech Recognition for Dysphonic Patients by using Oriented Local FeaturesAli, Z. / Muhammad, G. / Alsulaiman, M. / Elamvazuthi, I. / Al-Mutib, K. et al. | 2014
- 275
-
Data Analysis in Subspace for Dynamic DataShi, Y. / Kim, S. et al. | 2014
- 281
-
Multi-Agent Architecture for Help Desk SupportKamel, A. et al. | 2014
- 287
-
PCA Based Mobile Robot Navigation and Mapping IntelligenceAlmutib, K. / Mattar, E. / Alsulaiman, M. / Hedjar, R. et al. | 2014
- 293
-
Practical Risk-Based Technique to Improve Reliability for Incremental Web Application DevelopmentJaffal, W. / Tian, J. et al. | 2014
- 299
-
Towards Bridging the Gap between CMMI and Agile Development MethodologiesGazzan, M. / Shaikh, A. et al. | 2014