Change search
Refine search result
1 - 3 of 3
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Dingsoyr, Torgeir
    et al.
    Šmite, Darja
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Managing Knowledge in Global Software Development Projects2014In: IT Professional Magazine, ISSN 1520-9202, E-ISSN 1941-045X, Vol. 16, no 1, p. 22-29Article in journal (Refereed)
    Abstract [en]

    How should knowledge be managed in global software development projects? To answer this question, the authors draw on established software engineering research and study three focus groups in two global companies, discussing which knowledge management approaches are appropriate.

  • 2.
    Munir, Hussan
    et al.
    Lunds Universitet, SWE.
    Runeson, Per
    Lunds Universitet, SWE.
    Wnuk, Krzysztof
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    How Companies Use OSS Tools Ecosystems for Open Innovation2019In: IT Professional Magazine, ISSN 1520-9202, E-ISSN 1941-045X, Vol. 21, no 6, p. 40-45, article id 8896157Article in journal (Refereed)
    Abstract [en]

    Moving toward the open innovation (OI) model requires multifaceted transformations within companies. It often involves giving away the tools for product development or sharing future product directions with open tools ecosystems. Moving from the traditional closed innovation model toward an OI model for software development tools shows the potential to increase software development competence and efficiency of organizations. We report a case study in software-intensive company developing embedded devices (e.g., smartphones) followed by a survey in OSS communities such as Gerrit, Git, and Jenkins. The studied branch focuses on developing Android phones. This paper presents contribution strategies and triggers for openness. These strategies include avoid forking OSS tools, empower developers to participate in the ecosystem, steer ecosystems through contributions, create business through differentiation, and create new ecosystems. The triggers of openness are from 30 different companies with examples. Finally, openness requires a cultural change aligned with strategies and business models. © 1999-2012 IEEE.

  • 3. Wu, Felix
    et al.
    Johnson, Henric
    Nilsson, Arne A.
    SOLA: Lightweight Security for Access Control in IEEE 802.112004In: IT Professional Magazine, ISSN 1520-9202, E-ISSN 1941-045X, Vol. 6, no 3, p. 10-16Article in journal (Refereed)
    Abstract [en]

    The IEEE 802.11 wireless standard provides little support for secure access control. As a result, access control in IEEE 802.11 on a per packet basis requires a new and robust identity authentication protocol. The SOLA (Statistical One-Bit Lightweight Authentication) protocol is well suited in a wireless constrained environment because this protocol's communication overhead is extremely low: only one bit. Furthermore, SOLA fulfills the requirements of being secure, useful, cheap, and robust. The synchronization algorithm performs very well. SOLA also makes it easy to develop a framework to detect and respond to, for instance, denial-of-service attacks or an adversary who tries to guess the identity authentication bit for successive packets.

1 - 3 of 3
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf