Registro 1 de 1, Base de información BIBCYT
IEEE Software
Sept/Oct 1997
|
Referencias Analíticas
*
When Past Solutions Cause Future Problems
Pescio, Carlo
pp. 19-21
|
*
Tool Support for Project Tracking
McConnell, Steve
pp. 120,119
|
*
The Mousetrap Paradigm
Cochran, Robert
p. 26
|
*
Security and Privacy: Promising Advances
Pfleeger, Charles P.
; Cooper, Deborah M.
pp. 27-32
|
*
Rapid Prototyping for Distributed Virtual Environments
Stytz, Martin R.
; Adams, Terry
; Garcia, Brian
; Sheasby, Steven M.
; Zurita , Brian
pp. 83-92
|
*
Navigating the Applet-Browser Divide
Kindlund, Erika
pp. 22-25
|
*
Modeling Concurrent Software
Sanden, Bo I.
pp. 93-100
|
*
Intrusion Detection via System Call Traces
Kosoresow, Andrew P.
; Hofmeyr, Steven A.
pp. 35-42
|
*
How Software Process Improvement Helped Motorola
Diaz, Michael
; Sligo, Joseph
pp. 75-81
|
*
Can a Manufacturing Quality Model Work for Software?
Binder, Robert V.
pp. 101-102,105
|
*
Breathing New Life into the Waterfall Model
Lott, Christopher M.
pp. 103-105
|
*
Bookshelf
Salomon, Daniel J.
; Gougher, Robert
Wilson, Greg
(Traductor) pp. 115-118
|
*
Between Scylla and Charybdis
Davis, Alan M.
pp. 4-6
|
*
A Software Platform for Testing Intrusion Detection Systems
Puketza, Nicholas
; Chung, Mandy
; Olsson, Ronald A.
; Mukherjee , Biswanath
pp. 43-51
|
*
A Flexible Security System for Using Internet Content
Islam, Nayeem
; Anand,, Rangachari
; Jaeger, Trent
; Rao , Josyula R.
pp. 52-59
|
*
A Cost-Value Approach for Prioritizing Requirements
Karlsson, Joachim
; Ryan, Kevin
pp. 67-74
|
|