Results 261 to 270 of about 136,721 (312)
Some of the next articles are maybe not open access.
The Maturity of Usability Maturity Models
2017The integration of usability practices in software development is not a straightforward process. In this context, the application of usability maturity models (UMM) in a software organization can provide insightful information to improve such integration.
Carmen L. Carvajal, Ana M. Moreno
openaire +1 more source
IEEE Aerospace and Electronic Systems Magazine, 2013
Performing fault diagnosis is an extremely difficult problem [1]. Given a complex system and a set of tests or alarm outcomes, the user wants to determine the most likely faulty component. Some of the most common diagnostic algorithms used are rule based, fault dictionaries, and fault trees [2], [3], [4].
Shane Strasser, John Sheppard
openaire +1 more source
Performing fault diagnosis is an extremely difficult problem [1]. Given a complex system and a set of tests or alarm outcomes, the user wants to determine the most likely faulty component. Some of the most common diagnostic algorithms used are rule based, fault dictionaries, and fault trees [2], [3], [4].
Shane Strasser, John Sheppard
openaire +1 more source
INCOSE International Symposium, 1994
AbstractIdeally, a systems engineering maturity model, together with a questionnaire and supporting documentation, provides the capability for an organization to do a self assessment of its processes, practices, management, metrics, and quality. It would be a framework for assessing an organization's level of systems engineering maturity.
openaire +1 more source
AbstractIdeally, a systems engineering maturity model, together with a questionnaire and supporting documentation, provides the capability for an organization to do a self assessment of its processes, practices, management, metrics, and quality. It would be a framework for assessing an organization's level of systems engineering maturity.
openaire +1 more source
2021
Provides a brand new CISO maturity model, which not only details the various types of CISOs, but also provides a growth and maturity path spanning from the entry-level CISO to the transcendent CISO who combines the best traits of both very technical and very business-oriented CISOs.
openaire +1 more source
Provides a brand new CISO maturity model, which not only details the various types of CISOs, but also provides a growth and maturity path spanning from the entry-level CISO to the transcendent CISO who combines the best traits of both very technical and very business-oriented CISOs.
openaire +1 more source
Maturing Requirements Engineering Process Maturity Models
2011The interest in Software Process Improvement (SPI) in the early 1990s stimulated tentative work on parallel models for Requirements Engineering (RE) process improvement in the late 1990s. This chapter examines the role of SPI and the implications of the exclusion of explicit support for RE in the most widely used SPI models.
openaire +1 more source
The Need for a Maturity Model for Maturity Modeling
2019Over the last decades, maturity models have gained popularity in both research and practice. While the growing number of maturity models demonstrates their potential, there seems to be a lack of structure in the development of these models and an unclear sense of quality of the resulting maturity models.
openaire +1 more source
2015
As cyber-D&D becomes a well-recognized, mainstream technique in cyber defense operations, a capability maturity model (CMM) can enable organizations to assess their readiness to conduct cyber-D&D operations. The systematic framework provided by a CMM enables organizations to implement a strategic cyber-D&D capability, assess the maturity of that ...
Kristin E. Heckman +4 more
openaire +1 more source
As cyber-D&D becomes a well-recognized, mainstream technique in cyber defense operations, a capability maturity model (CMM) can enable organizations to assess their readiness to conduct cyber-D&D operations. The systematic framework provided by a CMM enables organizations to implement a strategic cyber-D&D capability, assess the maturity of that ...
Kristin E. Heckman +4 more
openaire +1 more source

