Search Results

There are 41473 results for: content related to: Contextualized Project Management Practice: A Cluster Analysis of Practices and Best Practices

  1. An Empirical Identification of Project Management Toolsets and a Comparison Among Project Types

    Project Management Journal

    Volume 43, Issue 5, October 2012, Pages: 24–46, Claude Besner and Brian Hobbs

    Article first published online : 10 SEP 2012, DOI: 10.1002/pmj.21292

  2. THE GUNDESTRUP CAULDRON: New Scientific and Technical Investigations

    Acta Archaeologica

    Volume 76, Issue 2, December 2005, Pages: 1–58, Svend Nielsen, Jan Holme Andersen, Joel A. Baker, Charlie Christensen, Jens Glastrup, Pieter M. Grootes, Matthias Hüls, Arne Jouttijärvi, Erling Benner Larsen, Helge Brinch Madsen, Katharina Müller, Marie-Josee Nadeau, Stefan Röhrs, Heike Stege, Zofia Anna Stos and Tod E. Waight

    Article first published online : 7 DEC 2005, DOI: 10.1111/j.1600-0390.2005.00034.x

  3. Experiences in developing the mCRL2 toolset

    Software: Practice and Experience

    Volume 41, Issue 2, February 2011, Pages: 143–153, J. F. Groote, J. J. A. Keiren, F. P. M. Stappers, J. W. Wesselink and T. A. C. Willemse

    Article first published online : 29 NOV 2010, DOI: 10.1002/spe.1021

  4. Modeling and Verification of Real-Time Systems using the IF Toolset

    Modeling and Verification of Real-Time Systems: Formalisms and Software Tools

    Marius Bozga, Susanne Graf, Laurent Mounier, Iulian Ober, Pages: 319–351, 2010

    Published Online : 27 JAN 2010, DOI: 10.1002/9780470611012.ch10

  5. A Toolset for Maintaining Hybrid C++ Programs

    Journal of Software Maintenance: Research and Practice

    Volume 8, Issue 6, November 1996, Pages: 389–419, PANAGIOTIS K. LINOS and VINCENT COURTOIS

    Article first published online : 4 DEC 1998, DOI: 10.1002/(SICI)1096-908X(199611)8:6<389::AID-SMR141>3.0.CO;2-5

  6. The Microsoft Toolset

    Visual Intelligence

    Mark Stacey, Joe Salvatore, Adam Jorgensen, Pages: 33–51, 2014

    Published Online : 17 JUN 2014, DOI: 10.1002/9781118987179.ch3

  7. A model-driven process for engineering a toolset for a formal method

    Software: Practice and Experience

    Volume 41, Issue 2, February 2011, Pages: 155–166, Paolo Arcaini, Angelo Gargantini, Elvinia Riccobene and Patrizia Scandurra

    Article first published online : 23 JAN 2011, DOI: 10.1002/spe.1019

  8. Using application understanding to support impact analysis

    Journal of Software Maintenance: Research and Practice

    Volume 10, Issue 2, March/April 1998, Pages: 93–110, M. Joanna Fyson and Cornelia Boldyreff

    Article first published online : 4 DEC 1998, DOI: 10.1002/(SICI)1096-908X(199803/04)10:2<93::AID-SMR169>3.0.CO;2-6

  9. The Scalasca performance toolset architecture

    Concurrency and Computation: Practice and Experience

    Volume 22, Issue 6, 25 April 2010, Pages: 702–719, Markus Geimer, Felix Wolf, Brian J. N. Wylie, Erika Ábrahám, Daniel Becker and Bernd Mohr

    Article first published online : 10 MAR 2010, DOI: 10.1002/cpe.1556

  10. Model driven security framework for software design and verification

    Security and Communication Networks

    Volume 8, Issue 16, 10 November 2015, Pages: 2768–2792, Engin Deveci and Mehmet U. Caglayan

    Article first published online : 12 MAR 2015, DOI: 10.1002/sec.1200

  11. Best practices for describing, consuming, and discovering web services: a comprehensive toolset

    Software: Practice and Experience

    Volume 43, Issue 6, June 2013, Pages: 613–639, Juan Manuel Rodriguez, Marco Crasso, Cristian Mateos and Alejandro Zunino

    Article first published online : 9 APR 2012, DOI: 10.1002/spe.2123

  12. 4.3.3 Integrated Toolset and Workflow for Tradespace Analytics in Systems Engineering

    INCOSE International Symposium

    Volume 24, Issue 1, July 2014, Pages: 347–361, Valerie B. Sitterle, Michael D. Curry, Dane F. Freeman and Tommer R. Ender

    Article first published online : 31 OCT 2014, DOI: 10.1002/j.2334-5837.2014.tb03153.x

  13. You have full text access to this OnlineOpen article
    The Viking viewer for connectomics: scalable multi-user annotation and summarization of large volume data sets

    Journal of Microscopy

    Volume 241, Issue 1, January 2011, Pages: 13–28, J.R. ANDERSON, S. MOHAMMED, B. GRIMM, B.W. JONES, P. KOSHEVOY, T. TASDIZEN, R. WHITAKER and R.E. MARC

    Article first published online : 7 JUN 2010, DOI: 10.1111/j.1365-2818.2010.03402.x

  14. 5.5.2 The Effectiveness of Multiple Software Requirements Elicitation Methods — A Case Study

    INCOSE International Symposium

    Volume 10, Issue 1, July 2000, Pages: 652–657, Sara White, Regina M. Gonzales and Dr. Eric Johnson

    Article first published online : 4 NOV 2014, DOI: 10.1002/j.2334-5837.2000.tb00438.x

  15. The virtual finite-state machine design and implementation paradigm

    Bell Labs Technical Journal

    Volume 2, Issue 1, Spring 1997, Pages: 96–113, Alan R. Flora-Holmquist, Edward Morton, James D. O'Grady and Mark G. Staskauskas

    Article first published online : 14 AUG 2002, DOI: 10.1002/bltj.2035


    INCOSE International Symposium

    Volume 5, Issue 1, July 1995, Pages: 8–19, David A. Jones

    Article first published online : 4 NOV 2014, DOI: 10.1002/j.2334-5837.1995.tb01836.x

  17. 7.1.4 Automatic Generation and Verification of Design Specifications for Railway Signalling Applications

    INCOSE International Symposium

    Volume 11, Issue 1, July 2001, Pages: 176–182, Neil Robinson, Peter Kearney, David Tombs, David Barney and George Nikandros

    Article first published online : 4 NOV 2014, DOI: 10.1002/j.2334-5837.2001.tb02290.x

  18. Evaluating Web 2.0 technologies in higher education using students' perceptions and performance

    Journal of Computer Assisted Learning

    Volume 30, Issue 6, December 2014, Pages: 577–596, T. Karvounidis, K. Chimos, S. Bersimis and C. Douligeris

    Article first published online : 23 MAY 2014, DOI: 10.1111/jcal.12069

  19. Minimizing insider misuse through secure Identity Management

    Security and Communication Networks

    Volume 5, Issue 8, August 2012, Pages: 847–862, Ludwig Fuchs and Günther Pernul

    Article first published online : 25 FEB 2011, DOI: 10.1002/sec.314

  20. Fortifying Six Sigma with OR/MS Tools

    Six Sigma: Advanced Tools for Black Belts and Master Black Belts

    L. C. Tang, T. N. Goh, S. W. Lam, Pages: 49–69, 2006

    Published Online : 19 OCT 2006, DOI: 10.1002/0470062002.ch5