BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
softwar (12)
servic (8)
engin (7)
databas (7)
process (7)

Stem outsourc$ (all stems)

58 papers:

CAiSECAiSE-2015-OrtegaGTRC #modelling #outsourcing #process
Modelling Service Level Agreements for Business Process Outsourcing Services (AdRO, AMG, ADT, MR, ARC), pp. 485–500.
ICEISICEIS-v1-2015-SabelnikovaCT #approach #case study #outsourcing
Analysing Business-IT Alignment in the IT Outsourcing Context — A Case Study Approach (ES, CMC, JJMT), pp. 5–16.
REFSQREFSQ-2015-HiisilaKK #case study #challenge #outsourcing #process #requirements
Challenges of the Customer Organization’s Requirements Engineering Process in the Outsourced Environment — A Case Study (HH, MK, SK), pp. 214–229.
SACSAC-2015-Kerschbaum #generative #outsourcing
Oblivious outsourcing of garbled circuit generation (FK), pp. 2134–2140.
ICEISICEIS-v3-2014-NunoG #in the cloud #outsourcing #using
Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICSTICST-2014-LiGP #database #outsourcing
Sanitizing and Minimizing Databases for Software Application Test Outsourcing (BL, MG, DP), pp. 233–242.
ICALPICALP-v2-2013-FaustHV #outsourcing #pattern matching
Outsourced Pattern Matching (SF, CH, DV), pp. 545–556.
CHICHI-2013-ONeillRGM #crowdsourcing #outsourcing #question
Form digitization in BPO: from outsourcing to crowdsourcing? (JO, SR, AG, DBM), pp. 197–206.
CAiSECAiSE-2013-KramerE #outsourcing #requirements
Outsourcing Location Selection with SODA: A Requirements Based Decision Support Methodology and Tool (TK, ME), pp. 530–545.
CAiSECAiSE-2012-GhaddarTAB #as a service #multitenancy #outsourcing #variability
Variability as a Service: Outsourcing Variability Management in Multi-tenant SaaS Applications (AG, DT, AA, AB), pp. 175–189.
KMISKMIS-2012-Grim-YefsahD #information management #outsourcing
Knowledge Transfer in Practice — A Socio-technical System for the Transition in Outsourcing (MGY, JD), pp. 223–228.
SACSAC-2012-Kerschbaum #outsourcing #set
Collusion-resistant outsourcing of private set intersection (FK), pp. 1451–1456.
CASECASE-2011-DahaneR #multi #outsourcing
Economic model of outsourcing for a subcontractor manufacturing system in a single subcontractor — multi-outsourcers relationship (MD, NR), pp. 450–455.
VLDBVLDB-2011-BajajS #database #hardware #named #outsourcing
TrustedDB: A Trusted Hardware based Outsourced Database Engine (SB, RS), pp. 1359–1362.
ICALPICALP-v2-2011-GoodrichM #outsourcing #privacy #ram #simulation
Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
ICEISICEIS-v3-2011-QuG #analysis #identification #outsourcing #risk management
The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
KMISKMIS-2011-Grim-YefsahRT #information management #outsourcing
Changing Provider in an Outsourced Information System Project — Good Practices for Knowledge Transfer (MGY, CRS, VTG), pp. 318–321.
SACSAC-2011-ZhuWHAHY #outsourcing #verification
Dynamic audit services for integrity verification of outsourced storages in clouds (YZ, HW, ZH, GJA, HH, SSY), pp. 1550–1557.
CASECASE-2010-KimHS #outsourcing
Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
ICSMEICSM-2010-KellensNDJP #cobol #design #outsourcing #verification
Verifying the design of an outsourced COBOL system with IntensiVE (AK, CN, TD, LJ, BVP), pp. 1–8.
EDOCEDOC-2010-EshuisN #framework #outsourcing #process #using
A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
KDDKDD-2010-LinC #outsourcing #privacy #random
Privacy-preserving outsourcing support vector machines with random transformation (KPL, MSC), pp. 363–372.
KDDKDD-2010-TaiYC #mining #outsourcing #pseudo #taxonomy
k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining (CHT, PSY, MSC), pp. 473–482.
RERE-2010-MoraliW #outsourcing #requirements #specification
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (AM, RW), pp. 199–208.
SACSAC-2010-ScheithauerKKHHW #case study #modelling #outsourcing
Business modeling for service engineering: a case study in the IT outsourcing domain (GS, HK, JK, SH, HH, GW), pp. 118–123.
ICSEICSE-2010-NordioMM #distributed #outsourcing #re-engineering
Advanced hands-on training for distributed and outsourced software engineering (MN, RM, BM), pp. 555–558.
SIGMODSIGMOD-2009-NathYC #outsourcing
Secure outsourced aggregation via one-way chains (SN, HY, HC), pp. 31–44.
SIGMODSIGMOD-2009-YangPPK #authentication #database #outsourcing
Authenticated join processing in outsourced databases (YY, DP, SP, PK), pp. 5–18.
VLDBVLDB-2009-PangZM #database #outsourcing #scalability #verification
Scalable Verification for Outsourced Dynamic Databases (HP, JZ, KM), pp. 802–813.
VLDBVLDB-2009-WongCHKM #mining #outsourcing
An Audit Environment for Outsourcing of Frequent Itemset Mining (WKW, DWLC, EH, BK, NM), pp. 1162–1172.
WCREWCRE-2009-Storey #crowdsourcing #outsourcing
Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and Crowdsourcing (MADS), p. 3.
SEKESEKE-2009-AlvesPCL #approach #development #lifecycle #lightweight #outsourcing
From Strategy to Solution: A Lightweight Semi-prescriptive Approach for Software Development Lifecycle with Outsourcing Support (NA, SP, AC, ELJ), pp. 672–675.
SEKESEKE-2009-Hayshi #outsourcing #process
Establish Decision Making Process for Selecting Outsourcing Company (AH), pp. 666–671.
SACSAC-2009-EirakuSPKK #network #performance #virtual machine
Fast networking with socket-outsourcing in hosted virtual machine environments (HE, YS, CP, YK, KK), pp. 310–317.
SACSAC-2009-EshuisN #outsourcing #process
Constructing process views for service outsourcing (RE, AN), pp. 1615–1616.
ICEISICEIS-ISAS2-2008-MendezPMO08a #outsourcing
Critical Success Factors to Evaluate Information Technology Outsourcing Projects (EMM, MAP, LEM, MO), pp. 176–181.
VLDBVLDB-2007-Sion #outsourcing
Secure Data Outsourcing (RS), pp. 1431–1432.
VLDBVLDB-2007-VimercatiFJPS #data access #evolution #named #outsourcing
Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
VLDBVLDB-2007-WongCHKM #mining #outsourcing #security
Security in Outsourcing of Association Rule Mining (WKW, DWC, EH, BK, NM), pp. 111–122.
VLDBVLDB-2007-XieWYM #outsourcing
Integrity Auditing of Outsourced Data (MX, HW, JY, XM), pp. 782–793.
ITiCSEITiCSE-2007-HonigP #experience #learning #outsourcing #re-engineering
A classroom outsourcing experience for software engineering learning (WLH, TP), pp. 181–185.
SEKESEKE-2007-SantiagoMCSA #development #experience #outsourcing
QSEE Project: An Experience in Outsourcing Software Development for Space Applications (VAS, MdFMF, RC, WPdS, AMA), pp. 51–56.
SIGMODSIGMOD-2006-LiHKR #authentication #database #outsourcing
Dynamic authenticated index structures for outsourced databases (FL, MH, GK, LR), pp. 121–132.
WCREWCRE-2006-CapiluppiMB #how #outsourcing #quality
How Outsourcing Affects the Quality of Mission Critical Software (AC, JM, CB), pp. 285–287.
CAiSECAiSE-2006-YangNLC #approach #outsourcing #performance #query #xml
An Efficient Approach to Support Querying Secure Outsourced XML Information (YY, WN, HLL, JC), pp. 157–171.
SEKESEKE-2006-Hira #outsourcing
Outsourcing America (RH), pp. 1–2.
ICSEICSE-2006-NguyenBV #maintenance #outsourcing #trust
Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
CASECASE-2005-ViswanadhamB #outsourcing
Foreign direct investment or outsourcing: a supply chain decision model (NV, KB), pp. 232–237.
VLDBVLDB-2005-Sion #assurance #database #execution #outsourcing #query
Query Execution Assurance for Outsourced Databases (RS), pp. 601–612.
CIKMCIKM-2005-NarasimhaT #database #named #outsourcing
DSAC: integrity for outsourced databases with signature aggregation and chaining (MN, GT), pp. 235–236.
SACSAC-2005-MikhailovT #approach #fuzzy #outsourcing
Fuzzy approach to outsourcing of information technology services (LM, PET), pp. 94–98.
ICSEICSE-2005-HawthorneP #challenge #development #distributed #education #open source #outsourcing #re-engineering
Software engineering education in the era of outsourcing, distributed development, and open source software: challenges and opportunities (MJH, DEP), pp. 643–644.
CSMRCSMR-2004-RamosOA #evaluation #legacy #maintenance #outsourcing
Legacy Software Evaluation Model for Outsourced Maintainer (CSR, KMdO, NA), pp. 48–57.
CSMRCSMR-2003-RaoS #empirical #maintenance #outsourcing #using
Effort Drivers in Maintenance Outsourcing — An Experiment Using Taguchi’s Methodology (BSR, NLS), pp. 271–270.
ICSMEICSM-2002-RaoS #empirical #maintenance #outsourcing #process
Applicability of IEEE Maintenance Process for Corrective Maintenance Outsourcing — An Empirical Study (BSR, NLS), pp. 74–83.
ICSMEICSM-2001-BassinS #classification #fault #legacy #maintenance #orthogonal #outsourcing
Managing the Maintenance of Ported, Outsourced, and Legacy Software via Orthogonal Defect Classification (KB, PS), p. 726–?.
CAiSECAiSE-1999-KlingemannWA #adaptation #outsourcing #workflow
Adaptive Outsourcing in Cross-Organizational Workflows (JK, JW, KA), pp. 417–421.
CSEETCSEE-1996-McCabeOP #outsourcing
Stretching the McDonnell Douglas Software Training Budget: Striking a Balance Between In-House and Outsourcing (NM, GO, KP), pp. 199–215.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.