Язык:
Формат:
только полные версии  
Benefit/Cost-Driven Software Development. With Benefit Points and Size Points [SpringerOpen]
Другая компьютерная литература

Benefit/Cost-Driven Software Development. With Benefit Points and Size Points [SpringerOpen]

Автор: Hannay Jo Erskine
Год: 2021
полная версия

This open access book presents a set of basic techniques for estimating the benefit of IT development projects and portfolios. It also offers methods for monitoring how much of that estimated benefit is being achieved during projects. Readers can...
Modeling Excitable Tissue. The EMI Framework [SpringerOpen]
Другая компьютерная литература

Modeling Excitable Tissue. The EMI Framework [SpringerOpen]

Год: 2021
полная версия

This open access volume presents a novel computational framework for understanding how collections of excitable cells work. The key approach in the text is to model excitable tissue by representing the individual cells constituting the tissue. This...
Time Predictions. Understanding and Avoiding Unrealism in Project Planning and Everyday Life [SpringerOpen]
Другая компьютерная литература

Time Predictions. Understanding and Avoiding Unrealism in Project Planning and Everyday Life [SpringerOpen]

Год: 2018
полная версия

Predicting the time needed to complete a project, task or daily activity can be difficult and people frequently underestimate how long an activity will take. This book sheds light on why and when this happens, what we should do to avoid it and how...
The Huawei and Snowden Questions. Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? [SpringerOpen]
Другая компьютерная литература

The Huawei and Snowden Questions. Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? [SpringerOpen]

Автор: Lysne Olav
Год: 2018
полная версия

This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? ...