Sciweavers

6047 search results - page 126 / 1210
» Modeling with Extend
Sort
View
WEBI
2004
Springer
15 years 7 months ago
An Access Control Model for Web Services in Business Process
Business process describes a set of services that span enterprise boundaries and are provided by enterprises that see each other as partners. Web services is widely accepted and a...
Peng Liu, Zhong Chen
ATAL
2009
Springer
15 years 6 months ago
GDT4MAS: an extension of the GDT model to specify and to verify MultiAgent systems
The Goal Decomposition Tree model has been introduced in 2005 by Mermet et al. [9] to specify and verify the behaviour of an agent evolving in a dynamic environment. This model pr...
Bruno Mermet, Gaële Simon
93
Voted
HICSS
2005
IEEE
112views Biometrics» more  HICSS 2005»
15 years 7 months ago
Effective Work Practices for FLOSS Development: A Model and Propositions
We review the literature on Free/Libre Open Source Software (FLOSS) development and on software development, distributed work and teams more generally to develop a theoretical mod...
Kevin Crowston, Hala Annabi, James Howison, Chenge...
86
Voted
ACISP
2004
Springer
15 years 7 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
ER
1994
Springer
122views Database» more  ER 1994»
15 years 5 months ago
From E-R to "A-R" - Modelling Strategic Actor Relationships for Business Process Reengineering
Abstract. As information systems are increasingly being called upon to play vital roles in organizations, conceptual modelling techniques need to be extended to relate information ...
Eric S. K. Yu, John Mylopoulos