1 |
D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. Nielsen, S. Thatte, and D. Wine Simple Object Access Protocol (SOAP) 1.1, April 2007.
|
2 |
H. Maylor, "Beyond the Gantt chart: - Project management moving on," European Management Journal, 19(1), pp. 92-100, February 2001.
DOI
ScienceOn
|
3 |
M. Fredericks and V. Basili, Using Defect Tracking and Analysis to Improve Software Quality, A DACS State-of-the-Art Report, November 1998.
|
4 |
J. Aguero, M. Rebollo, C. Carrascosal and V. Julianl, "Does Android Dream with Intelligent Agents?," International Symposium on Distributed Computing and Artificial Intelligence, pp. 194-204, 2008.
|
5 |
Y. Ahn, S. Han, H. Kwak, S. Moon and H. Jeong, "Analysis of topological characteristics of huge online social networking services." In Proceedings of the 16th international Conference on World Wide Web, pp. 835-844, Banff, Alberta, Canada, May 08 - 12, 2007.
|
6 |
J. Spolsky, More Joel on Software, APress, 2008.
|
7 |
C. Chapman and S. Ward, Project risk management: processes, techniques and insights, Chichester, UK, John Wiley, 1996.
|
8 |
W. Clark, F.W. Trabold, The Gantt chart: a working tool of management, The Ronald Press Company, 1922
|
9 |
R. Ballagas, J. Borchers, M. Rohs, and J. G. Sheridan, "The Smart Phone: A Ubiquitous Input Device," IEEE Pervasive Computing, vol. 5, no. 1, pp. 70-77, January-March, 2006.
DOI
ScienceOn
|
10 |
A. Java, X. Song, T. Finin and B. Tseng, "Why we twitter: understanding microblogging usage and communities," In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis, pp. 56-65, 2007.
|