Sciweavers

666 search results - page 99 / 134
» Component-Based Design and Analysis: A Case Study
Sort
View
ISSA
2008
15 years 1 months ago
The Principle of Security Safeguards: Accidental Activities
The principle of information security safeguards is a key information principle contained in every privacy legislation measure, framework, and guideline. This principle requires d...
Rasika Dayarathna
DS
1997
104views Database» more  DS 1997»
15 years 1 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
JOT
2006
113views more  JOT 2006»
14 years 11 months ago
Constraint Validation in Model Compilers
Model transformation has become one of the most focused research field, motivated by for instance the OMG's Model-Driven Architecture (MDA). Metamodeling is a central techniq...
László Lengyel, Tihamer Levendovszky...
DATAMINE
2002
139views more  DATAMINE 2002»
14 years 11 months ago
Using Site Semantics to Analyze, Visualize, and Support Navigation
To satisfy potential customers of a Web site and to lead them to the goods offered by the site, one should support them in the course of navigation they have embarked on. This pape...
Bettina Berendt
RTS
2008
131views more  RTS 2008»
14 years 11 months ago
A constant-time dynamic storage allocator for real-time systems
Dynamic memory allocation has been used for decades. However, it has seldom been used in real-time systems since the worst case of spatial and temporal requirements for allocation ...
Miguel Masmano, Ismael Ripoll, Patricia Balbastre,...