Sciweavers

2740 search results - page 330 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
123
Voted
ER
2007
Springer
108views Database» more  ER 2007»
15 years 9 months ago
A Framework Supporting the Utilization of Domain Knowledge Embedded in Software
Software systems embed in them knowledge about the domain in which they operate. However, this knowledge is “latent”. Making such knowledge accessible could be of great value ...
Eran Rubin, Yair Wand
109
Voted
ERCIMDL
2007
Springer
129views Education» more  ERCIMDL 2007»
15 years 9 months ago
Know Thy Sensor: Trust, Data Quality, and Data Integrity in Scientific Digital Libraries
For users to trust and interpret the data in scientific digital libraries, they must be able to assess the integrity of those data. Criteria for data integrity vary by context, by ...
Jillian C. Wallis, Christine L. Borgman, Matthew S...
139
Voted
FROCOS
2007
Springer
15 years 9 months ago
Combining Algorithms for Deciding Knowledge in Security Protocols
Abstract. In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic funct...
Mathilde Arnaud, Véronique Cortier, St&eacu...
118
Voted
LADS
2007
Springer
15 years 9 months ago
DCaseLP: A Prototyping Environment for Multi-language Agent Systems
Abstract. This paper describes DCaseLP, a multi-language development environment for Multi-Agent Systems. DCaseLP provides tools and languages for modelling and implementing a MAS ...
Viviana Mascardi, Maurizio Martelli, Ivana Gungui
SGAI
2007
Springer
15 years 9 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...