Sciweavers

1538 search results - page 262 / 308
» Business Process Modeling Notation
Sort
View
SIGCSE
2009
ACM
143views Education» more  SIGCSE 2009»
15 years 7 months ago
Thinking about computational thinking
Jeannette Wing’s call for teaching Computational Thinking (CT) as a formative skill on par with reading, writing, and arithmetic places computer science in the category of basic...
James J. Lu, George H. L. Fletcher
KBSE
2002
IEEE
15 years 5 months ago
Report on the Workshop on the State of the Art in Automated Software Engineering
ort gives their abstracts. s of the position papers Recent Experiences with Code Generation and Task Automation Agents in Software Tools (J. Grundy, J. Hosking) As software grows i...
Yves Ledru, David F. Redmiles
104
Voted
AMAST
2008
Springer
15 years 2 months ago
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
A simple type confusion attack occurs in a security protocol, when a principal interprets data of one type as data of another. These attacks can be successfully prevented by \taggi...
Han Gao, Chiara Bodei, Pierpaolo Degano
121
Voted
JODL
2000
194views more  JODL 2000»
15 years 10 days ago
An open electronic marketplace through agent-based workflows: MOPPET
We propose an electronic marketplace architecture, called MOPPET, where the commerce processes in the marketplace are modeled as adaptable agent-based workflows. The higher level ...
Sena Nural Arpinar, Asuman Dogac, Nesime Tatbul
SACMAT
2011
ACM
14 years 3 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deï¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...