Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Dheerendra Kumar Tyagi"'
Publikováno v:
Indian Journal of Science and Technology. 12:1-5
Autor:
L. S. S. Reddy, Manoj Kumar Tyagi, Prashant Singh, Dheerendra Kumar Tyagi, Ajay Sikandar, Srinivasan Munisamy, Durgesh Kumar
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811604034
The earned value method (EVM) is used as a standard tool for tracking of traditional software projects in order to report their status during execution. However, the status reported by EVM is not reliable as it has a fundamental limitation of not con
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9df3e5a80db549883422fc16b167fdb3
https://doi.org/10.1007/978-981-16-0404-1_25
https://doi.org/10.1007/978-981-16-0404-1_25
Autor:
Lalit Kumar Tyagi, Neha Tyagi, Durgesh Kumar, Manoj Kumar Tyagi, Ajay Sikandar, Dheerendra Kumar Tyagi
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811604034
All projects are required to be tracked and reported their status information to the management for controlling their execution, and have limited resources in terms of budget and time, so agile projects are. Their tracking is an overhead for the soft
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bcb0b8b11e410255ebebdee694fbdd0d
https://doi.org/10.1007/978-981-16-0404-1_26
https://doi.org/10.1007/978-981-16-0404-1_26
Publikováno v:
Journal of Physics: Conference Series. 2007:012005
Keyloggers are kind of a rootkit malware that catch composed keystroke occasions of the console and save into log record, hence, it can capture delicate data, for example, usernames, PINs, and passwords, in this manner communicates into vindictive as