A Review of various Software Project Scheduling techniques
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Software project scheduling is one of the most important scheduling areas faced by software project management team. For a successful project, both software engineering and software management are very necessary. To complete the software project within a specified time limit, allocate a start and end date that determine the milestones and outcomes of the tasks, determine which tasks are depend on another task to complete its operation, save time, build consistency, enhance visibility scheduling is very essential. There are several software project management resources and schedule estimation methods have been developed. In this paper, we will make a review of some of these software project scheduling techniques which are used recently and are helpful in handling the various type of scheduling used in software projects.
Authors and Affiliations
Ramandeep Kaur , Sukhpreet Singh , Dr. Madhuchanda Rakshit
Enhanced Double Layer Security using RSA over DNA based Data Encryption System
In this paper we propose an enhanced algorithm to communicate data securely for communication and information security. The DNA cryptography is a new and promising area in cryptography. Here we propose techniques that us...
A Multi-hop approach for sensing coverage in wireless sensor network
Wireless sensor networks (WSNs) are recently rapidly growing research area in wireless communications. WSNs are studied widely and usefully applied in many applications like military surveillance, environmental monitorin...
A distributed system architecture for maximum utilization of idle resources and speedup for batch processing tasks.
Computers which are used in organizations for normal task, may have wastage of resources like processing power, memory (mainly primary memory). If computers are used as a single unit, even then some amount of resources a...
Handling Highly Frequent Network Updates For K Nearest Neighbor Query On Road Networks
Outsourcing spatial databases to the cloud has provided the spatial query integrity which means that the third party service provider is Untrustworthy, therefore query integrity verifies the correctness and completeness...
3D Password: A novel approach for more secure authentication
The melodramatic increase of computer usage has given rise to many security concerns. One major security concern is Authentication; process of validating who you are to who you claimed to be. Authentication provides more...