Planning and executing time-bound projects

被引:4
|
作者
Miranda, E
机构
[1] Univ. of Quebec at Montreal, Montreal, Que.
关键词
D O I
10.1109/2.989933
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The SPID approach combines critical chain planning with incremental development and rate monitoring to help software developers meet project deadlines.
引用
收藏
页码:73 / +
页数:8
相关论文
共 50 条
  • [31] Adaptive Time-Bound Key Management Scheme For The Internet of Things
    AboDoma, Noran
    Mostafa, Ahmad
    Shaaban, Eman
    2018 IEEE 88TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2018,
  • [32] On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme
    Sun, Hung-Min
    Wang, King-Hang
    Chen, Chien-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (02) : 159 - 160
  • [33] Secure fast WLAN handoff using time-bound delegated authentication
    Chien, Hung-Yu
    Hsu, Tzu-Hang
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2009, 22 (05) : 565 - 584
  • [34] Group signature with time-bound keys and unforgeability of expiry time for smart cities
    Junli Fang
    Tao Feng
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [35] Time-bound key-aggregate encryption for cloud storage
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chiu, Shih-Ting
    Chen, Shun-Der
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 2059 - 2069
  • [36] An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 3 - 9
  • [37] Role-based and time-bound access and management of EHR data
    Zhang, Rui
    Liu, Ling
    Xue, Rui
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 994 - 1015
  • [38] A Novel Time-bound Hierarchical Key Assignment Scheme for Mobile Agent
    Liu, Chia-Hui
    Chung, Yu-Fang
    Jhuo, Jin-De
    Chen, Tzer-Shyong
    Wang, Sheng-De
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 258 - +
  • [39] On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with Biometrics
    Femila, M. Daris
    Irudhayaraj, A. Anthony
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA STORAGE AND DATA ENGINEERING (DSDE 2010), 2010, : 283 - 286
  • [40] How do time-bound practices initiate local sustainability pathways?
    Turku, Veera
    Jokinen, Ari
    Jokinen, Pekka
    SUSTAINABLE CITIES AND SOCIETY, 2022, 79