|
Journals in DBLP
IEEE Computer 2001, volume: 34, number: 5
- Don Kiely
Wanted: Programmers for Handheld Devices. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:12-14 [Journal]
- John Edwards
Next-Generation Viruses Present New Challenges. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:16-18 [Journal]
- Atsushi Kara
Protecting Privacy in Remote-Patient Monitoring. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:24-27 [Journal]
- Bertrand Meyer
Software Engineering in the Academy. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:28-35 [Journal]
- Michael J. Lutz
Guest Editor's Introduction: Software Engineering on Internet Time. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:36- [Journal]
- Martin L. Griss, Gilda Pour
Accelerating Development with Agent Components. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:37-43 [Journal]
- Sahra Sedigh-Ali, Arif Ghafoor, Raymond A. Paul
Software Engineering Metrics for COTS-Based Systems. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:44-50 [Journal]
- Richard Baskerville, Linda Levine, Jan Pries-Heje, Balasubramaniam Ramesh, Sandra Slaughter
How Internet Software Companies Negotiate Quality. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:51-57 [Journal]
- Patricia K. Lawlis, Kathryn E. Mark, Deborah A. Thomas, Terry Courtheyn
A Formal Process for Evaluating COTS Software Products. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:58-63 [Journal]
- William E. Wright
An Efficient Video-on-Demand Model. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:64-70 [Journal]
- David Sobel
Will Carnivore Devour Online Privacy? [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:87-88 [Journal]
- Stanislaw Deniziak, Krzysztof Sapiecha
Developing a High-Level Fault Simulation Standard. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:89-90 [Journal]
- Victor R. Basili, Barry W. Boehm
COTS-Based Systems Top 10 List. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:91-93 [Journal]
- W. Neville Holmes
The Great Term Robbery. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2001, v:34, n:5, pp:94-96 [Journal]
|