of modern businesses, separation of concern mechanisms and abstractions are needed. iven development (MDD) approaches utilize abstraction and transformation to handle ty. In MDD, s...
Arnor Solberg, Devon M. Simmonds, Raghu Reddy, Rob...
Enterprise systems are frequently built by combining a number of discrete Web services together, a process termed composition. There are a number of architectural configurations ...
—The two-server model is quite promising for password based authentication, well suited for the setting of federated enterprises. However, none of the existing two-server passwor...
Abstract. Model checking is a fully automated technique for determining whether the behaviour of a finite-state reactive system satisfies a temporal logic specification. Despite th...
Shoham Ben-David, Richard J. Trefler, Grant E. Wed...
Ontologies allow researchers, domain experts, and software agents to share a common understanding of the concepts and relationships of a domain. The past few years have seen the p...
Gregory A. Silver, Osama Al-Haj Hassan, John A. Mi...