Tag #outsourcing
60 papers:
- DiGRA-2019-Nokkvi
- A Recipe for Disaster? The Emerging Ludo Mix and the Outsourcing of Narrative (JBN).
- KDD-2018-Anagnostopoulos #algorithm #online
- Algorithms for Hiring and Outsourcing in the Online Labor Market (AA, CC0, AF, SL, ET), pp. 1109–1118.
- CAiSE-2015-OrtegaGTRC #modelling #process
- Modelling Service Level Agreements for Business Process Outsourcing Services (AdRO, AMG, ADT, MR, ARC), pp. 485–500.
- ICEIS-v1-2015-SabelnikovaCT #approach #case study
- Analysing Business-IT Alignment in the IT Outsourcing Context — A Case Study Approach (ES, CMC, JJMT), pp. 5–16.
- REFSQ-2015-HiisilaKK #case study #challenge #process #requirements
- Challenges of the Customer Organization’s Requirements Engineering Process in the Outsourced Environment — A Case Study (HH, MK, SK), pp. 214–229.
- SAC-2015-Kerschbaum #generative
- Oblivious outsourcing of garbled circuit generation (FK), pp. 2134–2140.
- ICEIS-v3-2014-NunoG #in the cloud #using
- Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
- ICST-2014-LiGP #database
- Sanitizing and Minimizing Databases for Software Application Test Outsourcing (BL, MG, DP), pp. 233–242.
- ICALP-v2-2013-FaustHV #pattern matching
- Outsourced Pattern Matching (SF, CH, DV), pp. 545–556.
- CHI-2013-ONeillRGM #crowdsourcing #question
- Form digitization in BPO: from outsourcing to crowdsourcing? (JO, SR, AG, DBM), pp. 197–206.
- CAiSE-2013-KramerE #requirements
- Outsourcing Location Selection with SODA: A Requirements Based Decision Support Methodology and Tool (TK, ME), pp. 530–545.
- CAiSE-2012-GhaddarTAB #as a service #multitenancy #variability
- Variability as a Service: Outsourcing Variability Management in Multi-tenant SaaS Applications (AG, DT, AA, AB), pp. 175–189.
- KMIS-2012-Grim-YefsahD #information management
- Knowledge Transfer in Practice — A Socio-technical System for the Transition in Outsourcing (MGY, JD), pp. 223–228.
- SAC-2012-Kerschbaum #set
- Collusion-resistant outsourcing of private set intersection (FK), pp. 1451–1456.
- VLDB-2011-BajajS #database #hardware #named
- TrustedDB: A Trusted Hardware based Outsourced Database Engine (SB, RS), pp. 1359–1362.
- ICALP-v2-2011-GoodrichM #privacy #ram #simulation
- Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation (MTG, MM), pp. 576–587.
- ICEIS-v3-2011-QuG #analysis #identification #risk management
- The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
- KMIS-2011-Grim-YefsahRT #information management
- Changing Provider in an Outsourced Information System Project — Good Practices for Knowledge Transfer (MGY, CRS, VTG), pp. 318–321.
- SAC-2011-ZhuWHAHY #verification
- Dynamic audit services for integrity verification of outsourced storages in clouds (YZ, HW, ZH, GJA, HH, SSY), pp. 1550–1557.
- CASE-2011-DahaneR #multi
- Economic model of outsourcing for a subcontractor manufacturing system in a single subcontractor — multi-outsourcers relationship (MD, NR), pp. 450–455.
- ICSM-2010-KellensNDJP #cobol #design #verification
- Verifying the design of an outsourced COBOL system with IntensiVE (AK, CN, TD, LJ, BVP), pp. 1–8.
- EDOC-2010-EshuisN #framework #process #using
- A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
- KDD-2010-LinC #privacy #random
- Privacy-preserving outsourcing support vector machines with random transformation (KPL, MSC), pp. 363–372.
- KDD-2010-TaiYC #mining #pseudo #taxonomy
- k-Support anonymity based on pseudo taxonomy for outsourcing of frequent itemset mining (CHT, PSY, MSC), pp. 473–482.
- RE-2010-MoraliW #requirements #specification
- Risk-based Confidentiality Requirements Specification for Outsourced IT Systems (AM, RW), pp. 199–208.
- ICSE-2010-NordioMM #distributed #re-engineering
- Advanced hands-on training for distributed and outsourced software engineering (MN, RM, BM), pp. 555–558.
- SAC-2010-ScheithauerKKHHW #case study #modelling
- Business modeling for service engineering: a case study in the IT outsourcing domain (GS, HK, JK, SH, HH, GW), pp. 118–123.
- CASE-2010-KimHS
- Risk-averse outsourcing strategies for optimal intellectual property protection (BK, KH, KS), pp. 978–983.
- SIGMOD-2009-NathYC
- Secure outsourced aggregation via one-way chains (SN, HY, HC), pp. 31–44.
- SIGMOD-2009-YangPPK #authentication #database
- Authenticated join processing in outsourced databases (YY, DP, SP, PK), pp. 5–18.
- VLDB-2009-PangZM #database #scalability #verification
- Scalable Verification for Outsourced Dynamic Databases (HP, JZ, KM), pp. 802–813.
- VLDB-2009-WongCHKM #mining
- An Audit Environment for Outsourcing of Frequent Itemset Mining (WKW, DWLC, EH, BK, NM), pp. 1162–1172.
- WCRE-2009-Storey #crowdsourcing
- Beyond the Lone Reverse Engineer: Insourcing, Outsourcing and Crowdsourcing (MADS), p. 3.
- SEKE-2009-AlvesPCL #approach #development #lifecycle #lightweight
- From Strategy to Solution: A Lightweight Semi-prescriptive Approach for Software Development Lifecycle with Outsourcing Support (NA, SP, AC, ELJ), pp. 672–675.
- SEKE-2009-Hayshi #process
- Establish Decision Making Process for Selecting Outsourcing Company (AH), pp. 666–671.
- SAC-2009-EshuisN #process
- Constructing process views for service outsourcing (RE, AN), pp. 1615–1616.
- ICEIS-ISAS2-2008-MendezPMO08a
- Critical Success Factors to Evaluate Information Technology Outsourcing Projects (EMM, MAP, LEM, MO), pp. 176–181.
- VLDB-2007-Sion
- Secure Data Outsourcing (RS), pp. 1431–1432.
- VLDB-2007-VimercatiFJPS #data access #evolution #named
- Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
- VLDB-2007-WongCHKM #mining #security
- Security in Outsourcing of Association Rule Mining (WKW, DWC, EH, BK, NM), pp. 111–122.
- VLDB-2007-XieWYM
- Integrity Auditing of Outsourced Data (MX, HW, JY, XM), pp. 782–793.
- ITiCSE-2007-HonigP #experience #learning #re-engineering
- A classroom outsourcing experience for software engineering learning (WLH, TP), pp. 181–185.
- SEKE-2007-SantiagoMCSA #development #experience
- QSEE Project: An Experience in Outsourcing Software Development for Space Applications (VAS, MdFMF, RC, WPdS, AMA), pp. 51–56.
- SIGMOD-2006-LiHKR #authentication #database
- Dynamic authenticated index structures for outsourced databases (FL, MH, GK, LR), pp. 121–132.
- WCRE-2006-CapiluppiMB #how #quality
- How Outsourcing Affects the Quality of Mission Critical Software (AC, JM, CB), pp. 285–287.
- CAiSE-2006-YangNLC #approach #performance #query #xml
- An Efficient Approach to Support Querying Secure Outsourced XML Information (YY, WN, HLL, JC), pp. 157–171.
- SEKE-2006-Hira
- Outsourcing America (RH), pp. 1–2.
- ICSE-2006-NguyenBV #maintenance #trust
- Critical factors in establishing and maintaining trust in software outsourcing relationships (PTN, MAB, JMV), pp. 624–627.
- VLDB-2005-Sion #assurance #database #execution #query
- Query Execution Assurance for Outsourced Databases (RS), pp. 601–612.
- CIKM-2005-NarasimhaT #database #named
- DSAC: integrity for outsourced databases with signature aggregation and chaining (MN, GT), pp. 235–236.
- ICSE-2005-HawthorneP #challenge #development #distributed #education #open source #re-engineering
- Software engineering education in the era of outsourcing, distributed development, and open source software: challenges and opportunities (MJH, DEP), pp. 643–644.
- SAC-2005-MikhailovT #approach #fuzzy
- Fuzzy approach to outsourcing of information technology services (LM, PET), pp. 94–98.
- CASE-2005-ViswanadhamB
- Foreign direct investment or outsourcing: a supply chain decision model (NV, KB), pp. 232–237.
- SIGITE-2004-FulbrightR #how
- How information technology professionals keep from being outsourced or offshored (RF, RLR), pp. 188–193.
- CSMR-2004-RamosOA #evaluation #legacy #maintenance
- Legacy Software Evaluation Model for Outsourced Maintainer (CSR, KMdO, NA), pp. 48–57.
- CSMR-2003-RaoS #empirical #maintenance #using
- Effort Drivers in Maintenance Outsourcing — An Experiment Using Taguchi’s Methodology (BSR, NLS), pp. 271–270.
- ICSM-2002-RaoS #empirical #maintenance #process
- Applicability of IEEE Maintenance Process for Corrective Maintenance Outsourcing — An Empirical Study (BSR, NLS), pp. 74–83.
- ICSM-2001-BassinS #classification #fault #legacy #maintenance #orthogonal
- Managing the Maintenance of Ported, Outsourced, and Legacy Software via Orthogonal Defect Classification (KB, PS), p. 726–?.
- CAiSE-1999-KlingemannWA #adaptation #workflow
- Adaptive Outsourcing in Cross-Organizational Workflows (JK, JW, KA), pp. 417–421.
- CSEE-1996-McCabeOP
- Stretching the McDonnell Douglas Software Training Budget: Striking a Balance Between In-House and Outsourcing (NM, GO, KP), pp. 199–215.