메뉴 건너뛰기




Volumn , Issue , 2013, Pages 5-8

Eliciting operations requirements for applications

Author keywords

applications requirements; devops; operations processes

Indexed keywords

ENGINEERING; INDUSTRIAL ENGINEERING;

EID: 84886044706     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RELENG.2013.6607688     Document Type: Conference Paper
Times cited : (16)

References (14)
  • 4
    • 84893421683 scopus 로고    scopus 로고
    • Why do upgrades fail and what can we do about it?: Toward dependable, online upgrades in enterprise system
    • Dumitras, T., Narasimhan, P. Why do upgrades fail and what can we do about it?: toward dependable, online upgrades in enterprise system. In Proceedings of the ACM/IFIP/USENIX Middleware'09
    • Proceedings of the ACM/IFIP/USENIX Middleware'09
    • Dumitras, T.1    Narasimhan, P.2
  • 5
  • 9
    • 84886015470 scopus 로고    scopus 로고
    • National institute of science and technology, recommended security controls for federal information systems and organizations
    • National Institute of Science and Technology, Recommended Security Controls for Federal Information Systems and Organizations, NIST SP800-53
    • NIST SP800-53
  • 10
    • 84886063595 scopus 로고    scopus 로고
    • Petri Nets, http://en. wikipedia. org/wiki/Petri
    • Nets, P.1
  • 13
    • 84886084109 scopus 로고    scopus 로고
    • Upstream Tracker
    • Upstream Tracker http://www. cnet. com/techtracker-free/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.