iven software product lines combine the abstraction capability of Model Driven Software Development (MDSD) and the variability management capability of Software Product Line Engin...
Krzysztof Czarnecki, Michal Antkiewicz, Chang Hwan...
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
There exists a growing class of distributed applications that require adaptive middleware services, i.e., services that are able to monitor changes in the execution environment an...
During a lifecycle of a large-scale Web application, Web developers produce a wide variety of inter-related Web objects. Following good Web engineering practice, developers often ...
: In electronic commerce, two fundamental types of models are business models and process models. While a business model is concerned with value exchanges between actors, a process...