loading
Assessment of quality and maturity level of R&D
2001 Edition, Volume Supplement, January 1, 2001 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The strategic importance of R&D will be emphasised even more in the future. Continuous improvement of the effectiveness of R&D requires an adequate and comprehensive assessment and measurement system. The present method, the...

Assessment of quality and maturity level of R&D
2001 Edition, Volume 1, January 1, 2001 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The strategic importance of R&D will be emphasised even more in the future. Continuous improvement of the effectiveness of R&D requires an adequate and comprehensive assessment and measurement system. The authors describe the...

Assessing information quality management maturity level using TIQM-CMM
2014 Edition, November 1, 2014 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Nowadays, information becomes an essential asset for enterprises, since its strategic role in decision making process. Therefore, enterprise must take a great effort to manage and improve quality of information they produce. In order to perform that task, implementing...

Process definition formalism maturity levels
1994 Edition, January 1, 1994 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Beginning with the observations that process definition formalisms are not very different from general purpose programming languages and that almost every type of programming language has been used as the basis of one or more process definition formalisms, we conclude that the...

Reliability Centered Maintenance Maturity Level Roadmap
2003 Edition, January 1, 2003 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Numerous maintenance organizations are implementing various forms of reliability centered maintenance (RCM). Whether it is a classic or a streamlined RCM program, the challenge is to do it fast, but with predictable performance, quality, cost, and schedule. Hence, organizations...

FlOSS Managed Data Sources Maturity Level: a first attempt
2007 Edition, October 1, 2007 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Many organizations have started to integrate Free (libre) Open Source Software and are currently faced with the problem of selecting the components that meet their quality needs, in particular, regarding their evolvability and their robustness. Their assessment is...

Maturity level of cloud computing at HCT
2017 Edition, October 1, 2017 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Today education is associated with information technologies substantial in regards to content delivery, communication and collaboration. Cloud computing is being adopted by educational institutions at a rapid pace because of the need for servers, storage and software is high in...

Study on maturity level transition mechanism of knowledge management
2012 Edition, Volume 1, October 1, 2012 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

The maturity levels and key process areas are the important parts of enterprise knowledge management maturity model. The implementation of key processes areas by groups is the basis to achieve maturity level transitions; it can promote...

Assessment system of emerging technology maturity level based on CMM
2010 Edition, December 1, 2010 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Emerging technology maturity level is the basis of emerging technology assessment, with special characteristics. Based on existing assessment on new technology maturity level, assessment system of emerging technology maturity...

Methodology for Identifying the Cybersecurity Maturity Level of Smart Grids
2016 Edition, Volume 14, November 1, 2016 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Cybersecurity for Smart Grids requires a combined focus on information security for IT systems, on communications network and on the physical equipment of the electric grid. Thus, this work aims to develop a methodology for the identification of the cybersecurity...

Advertisement