Registro 1 de 1, Base de información BIBCYT
IEEE Software
July/Aug 1999
|
Referencias Analíticas
*
Using Patterns to Model Variability in Product Families
Keepence, Barry
; Mannion , Mike
pp. 102-108
|
*
Using Immersive Virtual Environments for Certification
Cruz-Neira, Carolina
; Lutz , Robyn R.
pp. 26-30
|
*
Toward Credible IT Testing and Certification
Wakid, Shukri A.
; Kuhn, D. Richard
; Wallace , Dolores R.
pp. 39-47
|
*
Third-Party Testing and the Quality of Software Components
Councill , William T.
pp. 55-57
|
*
System Insecurity in the Internet Age
Michener , John
pp. 62-69
|
*
Survivable Network System Analysis: A Case Study
Ellison, Robert J.
; Linger, Richard C.
; Longstaff, Thomas
; Mead , Nancy R
pp. 70-77
|
*
Stages of Team Development
Mackey , Karen
pp. 90-91
|
*
Software Security in an Internet World: An Executive Summary
Shimeall, Timothy J.
; McDermott , John J.
pp. 58-61
|
*
Software Safety Certification: A Multidomain Problem
Rodríguez-Dapena , Patricia
pp. 31-38
|
*
Software Process Improvement in Web Time
Wiegers , Karl
pp. 78-86
|
*
Mastering the Middleware Muddle
Brown , Alan W.
pp. 18-21
|
*
Guest Editor's Introduction: Certification-Reducing the Hidden Costs of Poor Quality
Voas , Jeffrey
pp. 22-25
|
*
Global R&D: How to Break Barriers
Belady , Laszlo A.
pp. 15-17
|
*
From the Editor
McConnell , Steve
pp. 6-11
|
*
Does the Patent Office Respect the Software Community?
Aharonian , Gregory
pp. 87-89
|
*
Cobol: A Historic Past, A Vital Future
Glass , Robert L.
pp. 120,118-119
|
*
Certifying Software for High-Assurance Environments
Voas , Jeffrey
pp. 48-54
|
*
Bookshelf
Durham, George B.
pp. 114-117
|
*
Analyzing User Requirements by Use Cases: A Goal-Driven Approach
Lee, Jonathan
; Xue , Nien-Lin
pp. 92-101
|
|