Flylib.com
Part II: Fundamental Estimation Techniques
Previous page
Table of content
Next page
Chapter List
Chapter 6: Introduction to Estimation Techniques
Chapter 7: Count, Compute, Judge
Chapter 8: Calibration and Historical Data
Chapter 9: Individual Expert Judgment
Chapter 10: Decomposition and Recomposition
Chapter 11: Estimation by Analogy
Chapter 12: Proxy-Based Estimates
Chapter 13: Expert Judgment in Groups
Chapter 14: Software Estimation Tools
Chapter 15: Use of Multiple Approaches
Chapter 16: Flow of Software Estimates on a Well-Estimated Project
Chapter 17: Standardized Estimation Procedures
Previous page
Table of content
Next page
Software Estimation: Demystifying the Black Art (Best Practices (Microsoft))
ISBN: 0735605351
EAN: 2147483647
Year: 2004
Pages: 212
Authors:
Steve McConnell
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Object Types, Predicates, and Basic Constraints
ORM Constraints
Mapping ORM Models to Logical Database Models
Conceptual Model Reports
Metrics and Models in Software Quality Engineering (2nd Edition)
Summary
The Exponential Model
Criteria for Model Evaluation
Code Integration Pattern
The Preparation Phase
The .NET Developers Guide to Directory Services Programming
Summary
Searching the Global Catalog
Discovering Schema Information at Runtime
Code Access Security
Authentication
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 336 Power and Control Tray Cable Type TC
Article 338 Service-Entrance Cable Types SE and USE
Article 426: Fixed Outdoor Electric De-Icing and Snow-Melting Equipment
Article 701 Legally Required Standby Systems
Example No. D4(a) Multifamily Dwelling
.NET-A Complete Development Cycle
Evaluating .NET for Windows Client Applications
Our First .NET Application
Analysis of the Advanced GDI+ Extensions Requirements
Building the Web Application with ASP.NET
Implementation of Online Photo Shop
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Attacking Oracle PL/SQL Web Applications
Running Operating System Commands
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies