BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
outsourcing
Google outsourcing

Tag #outsourcing

60 papers:

DiGRADiGRA-2019-Nokkvi
A Recipe for Disaster? The Emerging Ludo Mix and the Outsourcing of Narrative (JBN).
KDDKDD-2018-Anagnostopoulos #algorithm #online
Algorithms for Hiring and Outsourcing in the Online Labor Market (AA, CC0, AF, SL, ET), pp. 1109–1118.
CAiSECAiSE-2015-OrtegaGTRC #modelling #process
Modelling Service Level Agreements for Business Process Outsourcing Services (AdRO, AMG, ADT, MR, ARC), pp. 485–500.
ICEISICEIS-v1-2015-SabelnikovaCT #approach #case study
Analysing Business-IT Alignment in the IT Outsourcing Context — A Case Study Approach (ES, CMC, JJMT), pp. 5–16.
REFSQREFSQ-2015-HiisilaKK #case study #challenge #process #requirements
Challenges of the Customer Organization’s Requirements Engineering Process in the Outsourced Environment — A Case Study (HH, MK, SK), pp. 214–229.
SACSAC-2015-Kerschbaum #generative
Oblivious outsourcing of garbled circuit generation (FK), pp. 2134–2140.
ICEISICEIS-v3-2014-NunoG #in the cloud #using
Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICSTICST-2014-LiGP #database
Sanitizing and Minimizing Databases for Software Application Test Outsourcing (BL, MG, DP), pp. 233–242.
ICALPICALP-v2-2013-FaustHV #pattern matching
Outsourced Pattern Matching (SF, CH, DV), pp. 545–556.
CHICHI-2013-ONeillRGM #crowdsourcing #question
Form digitization in BPO: from outsourcing to crowdsourcing? (JO, SR, AG, DBM), pp. 197–206.
CAiSECAiSE-2013-KramerE #requirements
Outsourcing Location Selection with SODA: A Requirements Based Decision Support Methodology and Tool (TK, ME), pp. 530–545.
CAiSECAiSE-2012-GhaddarTAB #as a service #multitenancy #variability
Variability as a Service: Outsourcing Variability Management in Multi-tenant SaaS Applications (AG, DT, AA, AB), pp. 175–189.
KMISKMIS-2012-Grim-YefsahD #information management
Knowledge Transfer in Practice — A Socio-technical System for the Transition in Outsourcing (MGY, JD), pp. 223–228.
SACSAC-2012-Kerschbaum #set
Collusion-resistant outsourcing of private set intersection (FK), pp. 1451–1456.
VLDBVLDB-2011-BajajS #database #hardware #named
TrustedDB: A Trusted Hardware based Outsourced Database Engine (SB, RS), pp. 1359–1362.
ICALPICALP-v2-2011-GoodrichM #privacy #ram #simulation
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
ICEISICEIS-v3-2011-QuG #analysis #identification #risk management
The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
KMISKMIS-2011-Grim-YefsahRT #information management
Changing Provider in an Outsourced Information System Project — Good Practices for Knowledge Transfer (MGY, CRS, VTG), pp. 318–321.
SACSAC-2011-ZhuWHAHY #verification
Dynamic audit services for integrity verification of outsourced storages in clouds (YZ, HW, ZH, GJA, HH, SSY), pp. 1550–1557.
CASECASE-2011-DahaneR #multi
Economic model of outsourcing for a subcontractor manufacturing system in a single subcontractor — multi-outsourcers relationship (MD, NR), pp. 450–455.
ICSMEICSM-2010-KellensNDJP #cobol #design #verification
Verifying the design of an outsourced COBOL system with IntensiVE (AK, CN, TD, LJ, BVP), pp. 1–8.
EDOCEDOC-2010-EshuisN #framework #process #using
A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
KDDKDD-2010-LinC #privacy #random
Privacy-preserving outsourcing support vector machines with random transformation (KPL, MSC), pp. 363–372.
KDDKDD-2010-TaiYC #mining #pseudo #taxonomy
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining (CHT, PSY, MSC), pp. 473–482.
RERE-2010-MoraliW #requirements #specification
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (AM, RW), pp. 199–208.
ICSEICSE-2010-NordioMM #distributed #re-engineering
Advanced hands-on training for distributed and outsourced software engineering (MN, RM, BM), pp. 555–558.
SACSAC-2010-ScheithauerKKHHW #case study #modelling
Business modeling for service engineering: a case study in the IT outsourcing domain (GS, HK, JK, SH, HH, GW), pp. 118–123.
CASECASE-2010-KimHS
Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
SIGMODSIGMOD-2009-NathYC
Secure outsourced aggregation via one-way chains (SN, HY, HC), pp. 31–44.
SIGMODSIGMOD-2009-YangPPK #authentication #database
Authenticated join processing in outsourced databases (YY, DP, SP, PK), pp. 5–18.
VLDBVLDB-2009-PangZM #database #scalability #verification
Scalable Verification for Outsourced Dynamic Databases (HP, JZ, KM), pp. 802–813.
VLDBVLDB-2009-WongCHKM #mining
An Audit Environment for Outsourcing of Frequent Itemset Mining (WKW, DWLC, EH, BK, NM), pp. 1162–1172.
WCREWCRE-2009-Storey #crowdsourcing
Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and Crowdsourcing (MADS), p. 3.
SEKESEKE-2009-AlvesPCL #approach #development #lifecycle #lightweight
From Strategy to Solution: A Lightweight Semi-prescriptive Approach for Software Development Lifecycle with Outsourcing Support (NA, SP, AC, ELJ), pp. 672–675.
SEKESEKE-2009-Hayshi #process
Establish Decision Making Process for Selecting Outsourcing Company (AH), pp. 666–671.
SACSAC-2009-EshuisN #process
Constructing process views for service outsourcing (RE, AN), pp. 1615–1616.
ICEISICEIS-ISAS2-2008-MendezPMO08a
Critical Success Factors to Evaluate Information Technology Outsourcing Projects (EMM, MAP, LEM, MO), pp. 176–181.
VLDBVLDB-2007-Sion
Secure Data Outsourcing (RS), pp. 1431–1432.
VLDBVLDB-2007-VimercatiFJPS #data access #evolution #named
Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
VLDBVLDB-2007-WongCHKM #mining #security
Security in Outsourcing of Association Rule Mining (WKW, DWC, EH, BK, NM), pp. 111–122.
VLDBVLDB-2007-XieWYM
Integrity Auditing of Outsourced Data (MX, HW, JY, XM), pp. 782–793.
ITiCSEITiCSE-2007-HonigP #experience #learning #re-engineering
A classroom outsourcing experience for software engineering learning (WLH, TP), pp. 181–185.
SEKESEKE-2007-SantiagoMCSA #development #experience
QSEE Project: An Experience in Outsourcing Software Development for Space Applications (VAS, MdFMF, RC, WPdS, AMA), pp. 51–56.
SIGMODSIGMOD-2006-LiHKR #authentication #database
Dynamic authenticated index structures for outsourced databases (FL, MH, GK, LR), pp. 121–132.
WCREWCRE-2006-CapiluppiMB #how #quality
How Outsourcing Affects the Quality of Mission Critical Software (AC, JM, CB), pp. 285–287.
CAiSECAiSE-2006-YangNLC #approach #performance #query #xml
An Efficient Approach to Support Querying Secure Outsourced XML Information (YY, WN, HLL, JC), pp. 157–171.
SEKESEKE-2006-Hira
Outsourcing America (RH), pp. 1–2.
ICSEICSE-2006-NguyenBV #maintenance #trust
Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
VLDBVLDB-2005-Sion #assurance #database #execution #query
Query Execution Assurance for Outsourced Databases (RS), pp. 601–612.
CIKMCIKM-2005-NarasimhaT #database #named
DSAC: integrity for outsourced databases with signature aggregation and chaining (MN, GT), pp. 235–236.
ICSEICSE-2005-HawthorneP #challenge #development #distributed #education #open source #re-engineering
Software engineering education in the era of outsourcing, distributed development, and open source software: challenges and opportunities (MJH, DEP), pp. 643–644.
SACSAC-2005-MikhailovT #approach #fuzzy
Fuzzy approach to outsourcing of information technology services (LM, PET), pp. 94–98.
CASECASE-2005-ViswanadhamB
Foreign direct investment or outsourcing: a supply chain decision model (NV, KB), pp. 232–237.
SIGITESIGITE-2004-FulbrightR #how
How information technology professionals keep from being outsourced or offshored (RF, RLR), pp. 188–193.
CSMRCSMR-2004-RamosOA #evaluation #legacy #maintenance
Legacy Software Evaluation Model for Outsourced Maintainer (CSR, KMdO, NA), pp. 48–57.
CSMRCSMR-2003-RaoS #empirical #maintenance #using
Effort Drivers in Maintenance Outsourcing — An Experiment Using Taguchi’s Methodology (BSR, NLS), pp. 271–270.
ICSMEICSM-2002-RaoS #empirical #maintenance #process
Applicability of IEEE Maintenance Process for Corrective Maintenance Outsourcing — An Empirical Study (BSR, NLS), pp. 74–83.
ICSMEICSM-2001-BassinS #classification #fault #legacy #maintenance #orthogonal
Managing the Maintenance of Ported, Outsourced, and Legacy Software via Orthogonal Defect Classification (KB, PS), p. 726–?.
CAiSECAiSE-1999-KlingemannWA #adaptation #workflow
Adaptive Outsourcing in Cross-Organizational Workflows (JK, JW, KA), pp. 417–421.
CSEETCSEE-1996-McCabeOP
Stretching the McDonnell Douglas Software Training Budget: Striking a Balance Between In-House and Outsourcing (NM, GO, KP), pp. 199–215.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.