Search Results - (( Defined (contributors OR contributions) pensions plans ) OR ((( Defined ((distribution operation) OR (distribution constructions)) plan ) OR ( Defined distribution version plans ))))

  1. 241

    Management of uncertainty : theory and application in the design of systems and organizations by Grote, Gudela

    Published: Springer-Verlag, 2009
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  2. 242

    Collaborative genomics projects : a comprehensive guide First edition. by Sheth, Margi, Zhang, Jiashan, Zenklusen, Jean C.

    Published: Academic Press is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Contents: “…Establishing a Data Generation Pipeline and Quality Control MeasuresProper Tracking of Data Generation; Conclusion; References; 6 Pipeline: Data Storage and Dissemination; Introduction; Creation of Centralized Data Management Center; Define Standard Data and Metadata Formats; Collect, Store, and Version Data and Metadata; Implement Quality Control Measures for Submitted Data; Put in Place Appropriate Security and Access Controls; Redistribute Data and Metadata Tailored to Diverse Project Stakeholders and End Users; Conclusion; References; 7 Pipeline: Data Analysis; Introduction.…”
    Elsevier - Click here for access
    eBook
  3. 243

    Remediation in medical education : a mid-course correction Second edition. by SpringerLink (Online service)

    Published: Springer International Publishing, 2023
    Description: 1 online resource (xxxv, 330 pages) : illustrations (some color)
    Contents: “…Goal 1E: Promote the Availability of Remediation Resources to All Learners and Health Professions Education Community Members -- Goal 1F: Support Faculty Development Initiatives for All Steps of the Remediation Process, Including Early Identification, Intervention, and Referral -- Phase 2: Structural Elements of the Remediation Process -- Goal 2A: Tailor Remediation Plans to Individual Learners' Needs -- Goal 2B: Construct Effective and Nonjudgmental Processes to Share Evolving Information About Learners Who Struggle -- Goal 2C: Avoid Conflicts of Interest When Distributing Remediation Roles.…”
    SpringerLink - Click here for access
    eBook
  4. 244

    Product-focused software process improvement : 8th International conference, PROFES 2007, Riga, Latvia, July 2-4, 2007 : proceedings by PROFES 2007 Rīga, Latvia, SpringerLink (Online service)

    Published: Springer, 2007
    Description: 1 online resource (xii, 414 pages) : illustrations.
    Contents: “…Keynote Addresses -- Software Development and Globalization -- Software Development Globalization from the Baltic Perspective -- Experiences in Applying Agile Software Development in F-Secure -- People Side of IT Globalization -- Global Software Development -- An Industrial Survey of Software Outsourcing in China -- Understanding Lacking Trust in Global Software Teams: A Multi-case Study -- Utilization of a Set of Software Engineering Roles for a Multinational Organization -- Software Process Improvement -- Software Verification Process Improvement Proposal Using Six Sigma -- Software Development Improvement with SFIM -- SPI-KM -- Lessons Learned from Applying a Software Process Improvement Strategy Supported by Knowledge Management -- Organisational Readiness and Software Process Improvement -- Software Process Improvement Through Teamwork Management -- De-motivators of Software Process Improvement: An Analysis of Vietnamese Practitioners' Views -- Software Process Modeling and Evolution -- Defining Software Processes Through Process Workshops: A Multicase Study -- Improving an Industrial Reference Process by Information Flow Analysis: A Case Study -- Connecting the Rationale for Changes to the Evolution of a Process -- Industrial Experiences -- Use of Non-IT Testers in Software Development -- Requirements Management Practices as Patterns for Distributed Product Management -- SPI Consulting in a Level 1 Company: An Experience Report -- Agile Software Development -- On the Effects of Pair Programming on Thoroughness and Fault-Finding Effectiveness of Unit Tests -- An Agile Toolkit to Support Agent-Oriented and Service-Oriented Computing Mechanisms -- Achieving Success in Supply Chain Management Software by Agility -- Software Measurement -- Software Measurement Programs in SMEs -- Defining Software Indicators: A Methodological Framework -- Smart Technologies in Software Life Cycle -- Convertibility Between IFPUG and COSMIC Functional Size Measurements -- A Framework for Measuring and Evaluating Program Source Code Quality -- Software Fault Prediction with Object-Oriented Metrics Based Artificial Immune Recognition System -- Simulation and Decision Support -- Operational Planning, Re-planning and Risk Analysis for Software Releases -- Project Cost Overrun Simulation in Software Product Line Development -- E-Service Architecture Selection Based on Multi-criteria Optimization -- Processes and Methods -- A Component-Based Process for Developing Automotive ECU Software -- A Systematic Approach to Service-Oriented Analysis and Design -- Improving the Problem Management Process from Knowledge Management Perspective -- Workshop -- Experience on Applying Quantitative and Qualitative Empiricism to Software Engineering -- Tutorials -- Using Metrics to Improve Software Testing -- Increase ICT Project Success with Concrete Scope Management -- Agile Software Development: Theoretical and Practical Outlook.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  5. 245

    Configuration management for senior managers : essential product configuration and lifecycle management for manufacturing by Watts, Frank B.

    Published: Elsevier : BH, 2015
    Description: 1 online resource.
    Contents: “…FUNCTION NAMERESPONSIBILITIES; REENGINEER OR CONTINUOUS IMPROVEMENT; PLAN TO IMPROVE; SUMMARY; Chapter Four -- CM and Software; SOFTWARE'S CURRENT CONDITION; MODERN TREND; PROCESS REDESIGN BEFORE SOFTWARE; CM'S ROLL IN SOFTWARE; WHAT CM SHOULD CONTROL-AND NOT; SOFTWARE (SW) AND FIRMWARE (FW) CONTROL; SUMMARY; Chapter Five -- Standard Foundation Blocks; STANDARDS WRITING; GENERAL STANDARDS; ACRONYMS AND DEFINITIONS; PART NUMBERS-SIGNIFICANT OR NOT; CLASS CODING; INTERCHANGEABILITY AND THE PART NUMBER; INTERCHANGEABILITY/PART NUMBER/REV CHANGE; ITEM/DOCUMENT NUMBERING.…”
    Elsevier - Click here for access
    eBook
  6. 246

    How to validate a pharmaceutical process by Ostrove, Steve

    Published: Academic Press is an imprint of Elsevier, 2016
    Description: 1 online resource.
    Contents: “…II: Stage I-Process Development4 Getting Started; Before It All Starts; Example; Getting Started (After the Equipment Specifications); The Validation Master Plan; Standard Operating Procedures (SOPs) Preparation; Quality Programs; Training; Basic Risk Approach; Putting it Together; Notes; 5 Basic Equipment and Utility Qualification; Introduction; Determining the Level of Qualification; Factory Acceptance Test and Site Acceptance Test; Commissioning; Qualification Protocols-Installation Qualification (IQ) and Operational Qualification (OQ); Performance Qualification.…”
    Elsevier - Click here for access
    eBook
  7. 247

    Lean Six Sigma : methods for production optimization by Niemann, Jörg

    Published: Springer, 2024
    Description: 1 online resource (156 p.)
    Contents: “…5.3.3 Solution proposal and blank templates -- References -- 6 Line Balancing -- 6.1 Classification of the Method -- 6.2 Description of the Method -- 6.2.1 Actual Analysis -- 6.2.1.1 Activities -- 6.2.1.2 Customer Cycle -- 6.2.1.3 OEE -- Overall Equipment Effectiveness -- 6.2.1.4 Cycle and Takt Time -- 6.2.2 Presentation of Analysis Results -- 6.2.2.1 Work Distribution Diagram -- 6.2.2.2 Operation List -- 6.2.2.3 Network Planning Technique -- 6.3 Workshop 9: "Aircraft Manufacturing" -- 6.3.1 Production Round 1 -- 6.3.1.1 Execution of the First Production Round -- 6.3.1.2 Round 1: Evaluation.…”
    SpringerLink - Click here for access
    eBook
  8. 248

    Wireless and satellite systems : 11th EAI international conference, WiSATS 2020, Nanjing, China, September 17-18, 2020 : proceedings. Part I by WiSATS (Conference) Online), SpringerLink (Online service)

    Published: Springer, 2021
    Description: 1 online resource (xix, 498 pages) : illustrations (some color).
    SpringerLink - Click here for access
    Conference Proceeding eBook
  9. 249

    Software and data technologies : Second International Conference, ICSOFT/ENASE 2007, Barcelona, Spain, July 22-25, 2007, revised selected papers by ICSOFT 2007 Barcelona, Spain, SpringerLink (Online service), ICSOFT (Conference), ENASE (Conference)

    Published: Springer, 2008
    Description: 1 online resource (xv, 428 pages) : illustrations.
    Contents: “…Invited Papers -- Benefits of Enterprise Ontology for the Development of ICT-Based Value Networks -- SOA Pragmatism -- Software and Data Technologies -- A Simple Language for Novel Visualizations of Information -- Generic Components for Static Operations at Object Level -- A Visual Dataflow Language for Image Segmentation and Registration -- A Debugger for the Interpreter Design Pattern -- Concepts for High-Performance Scientific Computing -- A Model Driven Architecture Approach to Web Development -- Reverse-Architecting Legacy Software Based on Roles: An Industrial Experiment -- A Supporting Tool for Requirements Elicitation Using a Domain Ontology -- Pattern Detection in Object-Oriented Source Code -- Testing the Effectiveness of MBIUI Life-Cycle Framework for the Development of Affective Interfaces -- Developer Stories: Improving Architecture in Agile Practice -- An Ontological SW Architecture Supporting Agile Development of Semantic Portals -- The Vcodex Platform for Data Compression -- Classification of Benchmarks for the Evaluation of Grid Resource Planning Algorithms -- A Disconnection-Aware Mechanism to Provide Anonymity in Two-Level P2P Systems -- Approximation and Scoring for XML Data Management -- Quantitative Analysis of the Top Ten Wikipedias -- A Semantic Web Approach for Ontological Instances Analysis -- Aspects Based Modeling of Web Applications to Support Co-evolution -- Recommending Trustworthy Knowledge in KMS by Using Agents -- Recent Developments in Automated Inferencing of Emotional State from Face Images -- Inconsistency-Tolerant Integrity Checking for Knowledge Assimilation -- Improving Cutting-Stock Plans with Multi-objective Genetic Algorithm -- Knowledge Purpose and Visualization -- Empirical Experimentation for Validating the Usability of Knowledge Packages in Transferring Innovations -- An Ontological Investigation in the Field of Computer Programs -- Evaluation of Novel Approaches to Software Engineering -- Formal Problem Domain Modeling within MDA -- Model Based Testing for Agent Systems -- A Metamodel for Defining Development Methodologies.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  10. 250

    Forest recreation 3rd ed. by Douglass, Robert W.

    Published: Pergamon Press, 1982
    Description: 1 online resource (x, 326 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  11. 251

    Beginning backup and restore for SQL Server : data loss management and prevention techniques by Beard, Bradley

    Published: Apress, 2018
    Description: 1 online resource : illustrations.
    SpringerLink - Click here for access
    eBook
  12. 252

    Small satellites for earth observation : selected contributions by International Academy of Astronautics. International Symposium, SpringerLink (Online service)

    Published: Springer, 2008
    Description: 1 online resource (xxi, 406 pages) : illustrations, maps.
    SpringerLink - Click here for access
    eBook
  13. 253
  14. 254

    Geographic information and cartography for risk and crises management : towards better solutions by SpringerLink (Online service)

    Published: Springer Verlag, 2010
    Description: 1 online resource (xxii, 446 pages) : illustrations, maps.
    Contents: “…Geoinformation Processing and Modelling -- Earth Observations and Dynamic Mapping: Key Assets for Risk Management -- Spatial Information for Disaster Management Using Examples from IstanbulIstanbul -- Rapid Population Maps for Crisis Response -- Modeling of Spatiotemporal Distribution of Urban Population at High Resolution -- Value for Risk Assessment and Emergency Management -- A Framework for Defining a 3D Model in Support of Risk Management -- DB4GeO, a 3D/4D Geodatabase and Its Application for the Analysis of Landslides -- GIS Procedure to Forecast and Manage Woodland Fires -- Cartographic Support of Fire Engine Navigation to Operation Site -- Strategies for the Automatic Extraction of Water Bodies from TerraSAR-X / TanDEM-X data -- GIS Techniques in the Evaluation of Pipeline Networks Seismic Hazard -- Towards a Quick Damage Detection System Based on Grid Computing -- GMES Services for Conflict Prevention and Mitigation: Supporting the DG RELEX in Mission Planning -- Geo-information Services -- Mobilizing Multi-source Geospatial Information for EW and EM: Maximize Sharing, Enhance Flexibility, and Minimize Costs -- Metainformation in Crisis Management Architecture -- Theoretical Approaches, INSPIRE Solution -- Collaborative Post-disaster Damage Mapping via Geo Web Services -- Decision Support for Tsunami Early Warning in Indonesia: The Role of OGC Standards -- A Service-Based Architecture for the Interoperability of Heterogeneous Sensor data: A Case Study on Early Warning -- Development of a Coupled Geoinformation and Simulation System for Early Warning -- Multi-criteria Evaluation for Emergency Management in Spatial Data Infrastructures -- Field Tracking Tool: A Collaborative Framework from the Field to the Decision Makers -- Practical Experience with a Contextual Map Service -- Advanced Cartographic Visualisation -- Cartography and Geoinformation for Early Warning and Emergency Management -- Process Support and Adaptive Geovisualisation in Emergency Management -- Perceptions of Various Cartographic Representations Under Specific Conditions -- Research of Students' Cartographical Knowledge in Early Warning and Crisis Management -- Geovisual Analytics Tools for Communicating Emergency and Early Warning -- Kernel Density Estimations for Visual Analysis of Emergency Response Data -- Monitoring and Comparing: A Cartographic Web Application for Real-time Visualization of Hydrological Data -- Designing Map Keys Map Key for Crisis ManagementCrisis Management on the Regional Operational and Informational Centre Level: Monitoring Transport of Dangerous Goods via Contextual Visualisation Contextual Visualization.…”
    SpringerLink - Click here for access
    eBook
  15. 255

    Hospital and healthcare security Sixth edition. by York, Tony W.

    Published: Butterworth-Heinemann, 2015
    Description: 1 online resource (xxvii, 721 pages)
    Contents: “…-- Staff and Line Positions -- Staffing Level Considerations -- References -- Defining Leadership -- Leadership Competencies -- The Security Leadership Role -- Selecting Management -- Succession Planning -- Leadership Development -- Continuous Development -- The Healthcare Security Supervisor -- Selecting Supervisors -- Shift Supervision -- Communication -- Training -- Monitoring of Performance -- Relationship with Officers -- Motivation -- Performance Management -- Performance Documentation -- Handling Problem Employees -- References -- The Security Officer -- Security Officer Authority -- Special Police Commission/Special Constable -- Licensing -- Selecting Security Personnel -- Recruitment -- Selection Criteria -- The Selection Process -- Full-Time Versus Part-Time Security Officers -- Wage Compensation -- Retention -- Performance Expectations -- Positive Reinforcement -- Rules and Regulations -- Disciplinary Action -- References -- Uniforms -- Determining Uniform Style -- Supplying and Maintaining the Uniform -- Use of Firearms -- Considerations in Arming Officers -- Trends in Arming Security Personnel -- Managing the Firearms Program -- Other Security and Defensive Equipment Considerations -- Notepad and Pen -- Communication Devices -- Handcuffs -- Flashlight -- Personal Protective Equipment -- Conducted Electrical Weapons (Tasers) -- Chemical Agents -- Batons -- Protective Vests -- Body Cameras -- The Duty Belt -- Use of Force -- Training -- Security Operations Manual -- References -- Training Concepts -- Types of Training -- New Security Officer Training -- On-the-Job Training -- Critical Task Focused Training -- Key Training Topics for the New Security Officer -- IAHSS Progressive Certification Program -- IAHSS Basic Security Officer Training -- IAHSS Advanced Security Officer Training -- IAHSS Supervisory Training -- Specialized or Supplemental Training -- Contemporary Issues in Healthcare Security Training -- Elective Training -- Training Resources and Records Requirements -- Instructors/Facilitators -- Training Materials -- Records -- References -- Deployment Objectives -- Flexing the Security Staffing Plan -- Scheduling the Security Staff -- Deployment Patterns and Concepts -- Post Assignments -- Basic Patrol Deployment Plans -- Double Coverage -- Operational versus Nonoperational Times -- Patient Care Units/Areas -- Entrances and Exits -- Basic Patrol Concepts -- External Patrol -- External Patrol Vehicles -- External Patrol Services/Considerations -- Canine Patrol -- Internal Patrol -- Importance of the First Patrol Round -- Reporting for Duty -- Shift Rotation -- Patrol Verification -- The Patrol Officer's Key Ring and Access Privileges -- Security Officer Response -- Patrol Problems -- References -- Purpose of Records -- Memory System -- Exchange of Information -- Operational Policy and Procedure -- Need for Administrative Records -- Report Formats -- Electronic Reports -- Report Preparation -- Basic Records -- Security Incident Report -- Security Supplemental Report -- Security Condition Report -- Daily Activity Report -- Parking Violation Notice -- Pass-on Record -- Master Name Index -- Monthly or Periodic Security Report -- Key Performance Indicators -- Annual Security Management Plan and Program Effectiveness Evaluation -- Keeping Departmental Records Current -- Records Retention -- References -- Patients.…”
    Elsevier - Click here for access
    eBook
  16. 256

    Future data and security engineering : big data, security and privacy, smart city and Industry 4.0 applications : 9th International Conference, FDSE 2022, Ho Chi Minh City, Vietnam... by FDSE (Conference) Ho Chi Minh City, Vietnam), SpringerLink (Online service)

    Published: Springer, 2022
    Description: 1 online resource.
    Contents: “…Invited Keynotes -- Towards a Foundation of Web3 -- In-Memory Computing Architectures for Big data and Machine Learning Applications -- Secure and Efficient Implementation of Electronic Money -- Managing the Quality of Data and Metadata for Biobanks -- Big Data Analytics and Distributed Systems -- Towards A Privacy, Secured and Distributed Clinical Data Warehouse Architecture -- Improving the Storage Utilization of 0-Complete Trees as Index Structures -- Implement the Data Conversion System by using Lightweight Coreset for Validation Process -- Content Selection Methods Using User Interest Prediction Based on Similarities of Web Activities -- ImageNet Challenging Classification with the Raspberry Pis: A Federated Learning Algorithm of Local Stochastic Gradient Descent Models -- Covid-19 Detection Based on Lung Lesion Signs in Big Data Processing Environment -- Predicting Loan Repayment Using A Hybrid of Genetic Algorithms, Logistic Regression, and Artificial Neural Networks -- Performance Evaluation of Regular Decomposition and Benchmark Clustering Methods -- Security and Privacy Engineering -- Authentication of Luxury Products Identifying Key Requirements from a Seller and Consumer Perspective -- Analysis of A New Practical SPN-based Scheme in the Luby-Rackoff Model -- Authorization and Access Control for Different Database Models: Requirements and Current State of the Art -- A Hierarchical Deterministic Wallet using Ed25519 Digital Signature Scheme -- A Secure Framework for Internet of Medical Things Security Based System using Lightweight Cryptography enabled Blockchain -- Signature Algorithms on Non-commutative Algebras over Finite Fields of Characteristic Two -- Design a Smart Lock System Using Fingerprint and Password for Enhancing Security -- Machine Learning and Artificial Intelligence for Security and Privacy -- Towards an Attention-based Threat Detection System for IoT Networks -- Security and Privacy Issues and Solutions in Federated Learning for Digital Healthcare -- pPATE: A Pragmatic Private Aggregation of Teacher Ensembles Framework by Sparse Vector Technique based Differential Privacy, Paillier Cryptosystem and Human-in-the-loop -- Vietnamese Texts Writing Styles Based Authorship Identification Model -- Application of Machine Learning in Malware Detection -- Smart City and Industry 4.0 Applications -- Text Classification Models and Topic Models: An Overall Picture and A Case Study in Vietnamese -- Deep Hybrid Models for Forecasting Stock Midprices from the High-Frequency Limit Order Book -- An Image Denoising Model based on Nonlinear Partial Diferential Equation Using Deep Learning -- Recommendations in E-Commerce Systems based on Deep Matrix Factorization -- AttendanceKit: A set of Role-based Mobile Applications for Automatic Attendance Checking with UHF RFID using Realtime Firebase and Face Recognition -- Poses Classification in a Taekwondo Lesson using Skeleton Data extracted from Videos with Shallow and Deep Learning Architectures -- Social Distancing Violation Detection in Video using ChessBoard and Bird's-eye Perspective -- 3D-FaultSeg-UNet: 3D Fault Segmentation in Seismic Data Using Bi-stream U-Net -- Applying Artificial Intelligence to Plan Flight Paths for Aircraft at Subsonic Speeds -- Capacity Building in Government: Towards Developing A Standard for A Functional Specialist in AI for Public Services -- On the Feasibility of Machine Learning Models for Customer Spending Prediction Problem -- Forecasting the Opening and Closing Price Trends of Stock Using Hybrid Models and Artificial Intelligence Algorithm -- Artificial Intelligence Use in e-Government Services: A Systematic Interdisciplinary Literature Review -- Face Recognition based on Deep Learning and Data Augmentation -- An Approach for Similarity Vietnamese Documents Detection from English Documents -- Combine Clasification Algorithm and Centernet Model to Predict Trafic Density -- Data Analytics and Healthcare Systems -- Comparison of Health Indicators Construction for Concrete Structure Using Acoustic Emission Hit and Kullback-Leibler Divergence -- Lung and Colon Tumor Classification Based on Transfer Learning-Based Techniques -- An Enhanced Diabetes Mellitus Prediction using Feature Selection-Based Type-2 Fuzzy Model -- A Novel Approach of Using Neural Circuit Policies for COVID-19 Classification on CT-images -- Lung Lesions Segmentation and Classification with Deep Neural Networks -- Security and Data Engineering -- Image Denoising using Fully Connected Network with Reinforcement Learning -- Energy Harvesting Aware for Delay-efficient Data Aggregation in Battery-free IoT Sensors -- Deep Models for Mispronounce Prediction for Vietnamese Learners of English -- An Approach to Hummed-tune and Song Sequences Matching -- 84 Birds Classification using Transfer Learning and EfficientNetB2 -- A Session-based Recommender System for Learning Resources -- A Drowsiness Detection System Based on Eye Landmarks Using IoT -- A Novel Approach for Vietnamese Speech Recognition Using Conformer -- Enhancing obfuscated malware detection with machine learning techniques -- Detecting Intrusion using Multiple Datasets in Software-Defined Networks -- Detecting Exams Fraud Using Transfer Learning and Fine-tuning for ResNet50 -- Shape of Pill Recognition Using Mask R-CNN.…”
    SpringerLink - Click here for access
    Conference Proceeding eBook
  17. 257

    Software engineering for embedded systems : methods, practical techniques, and applications First edition. by ScienceDirect (Online service)

    Published: Newnes, 2013
    Description: 1 online resource (xlix, 1150 pages).
    Contents: “…-- Certification killers -- Project planning strategies -- Strategy 1: determine the project certification scope early -- Strategy 2: determine feasibility of certification -- Strategy 3: select an independent assessor (if used) -- Strategy 4: understand your assessor's role (if used) -- Strategy 5: assessment communication is key -- Strategy 6: establish a basis of certification -- Strategy 7: establish a "fit and purpose" for your product -- Strategy 8: establish a certification block diagram -- Strategy 9: establish communication integrity objectives -- Strategy 10: identify all interfaces along the certification boundary -- Strategy 11: identify the key safety defensive strategies -- Strategy 12: define built in test (BIT) capability -- Strategy 13: define fault annunciation coverage -- Strategy 14: define reliance and expectation of the operator/user -- Strategy 15: define plan for developing software to appropriate integrity level -- Strategy 16: define artifacts to be used as evidence of compliance -- Strategy 17: plan for labor-intensive analyses -- Strategy 18: create user-level documentation -- Strategy 19: plan on residual activity -- Strategy 20: publish a well-defined certification plan -- Faults, failures, hazards, and risk analysis -- Faults, errors, and failures -- Availability and reliability -- Fault handling -- Hazard analysis -- Risk analysis -- Safety-critical architectures -- "Do-er"/"Check-er" -- Two processors -- "Voter" -- Software implementation strategies -- Strategy 1: have a well-defined, repeatable peer-review process -- Strategy 2: consider using existing safety coding standards -- Strategy 3: handle all combinations of input data -- Strategy 4: specific variable value checking -- Strategy 5: mark safety-critical code sections -- Strategy 6: timing execution checking -- Strategy 7: stale data -- Strategy 8: comparison of outputs -- Strategy 9: initialize data to least permissive state -- Strategy 10: order of execution -- Strategy 11: volatile data checking -- Strategy 12: non-volatile data checking -- Strategy 13: make sure the entire system can run -- Strategy 14: remove "dead" code -- Strategy 15: fill unused memory -- Strategy 16: static code analysis -- Background -- Is that software yours? …”
    Elsevier - Click here for access
    eBook
  18. 258

    CMMI for development : implementation guide by Chaudhary, Mukund, Chopra, Abhishek

    Published: Apress, 2017
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook
  19. 259
  20. 260

    CRM fundamentals by Kostojohn, Scott, Johnson, Mathew, Paulen, Brian

    Published: Apress, 2011
    Description: 1 online resource.
    SpringerLink - Click here for access
    eBook