Sciweavers

259 search results - page 12 / 52
» Representing the Applications and Compositions of Design Pat...
Sort
View
JCIT
2008
165views more  JCIT 2008»
14 years 11 months ago
Mining Processes using cluster approach for representing workflows
Although much attention is being paid to business Intelligence during the past decades, the design for applying business Intelligence and particularly in a workflow processes is s...
N. P. Kavya, M. V. Sathyanarayana, N. C. Naveen
ICSEA
2007
IEEE
15 years 5 months ago
Design and Development Tools for Next Generation Mobile Services
The actual standards for service authoring, composition and development are not easy to port and to apply for next generation mobile applications. This paper describes some tools ...
Giovanni Bartolomeo, Casalicchio Casalicchio, Stef...
FASE
2004
Springer
15 years 5 months ago
Modeling Role-Based Access Control Using Parameterized UML Models
Abstract. Organizations use Role-Based Access Control (RBAC) to protect computer-based resources from unauthorized access. There has been considerable work on formally specifying R...
Dae-Kyoo Kim, Indrakshi Ray, Robert B. France, Na ...
SQJ
2010
152views more  SQJ 2010»
14 years 10 months ago
Design pattern evolutions in QVT
One of the main goals of design patterns is to design for change. Many design patterns leave some room for future changes and evolutions. The application of design patterns leads ...
Jing Dong, Yajing Zhao, Yongtao Sun
111
Voted
APCCM
2006
15 years 1 months ago
On the suitability of UML 2.0 activity diagrams for business process modelling
UML is posited as the "swiss army knife" for systems modelling and design activities. It embodies a number of modelling formalisms that have broad applicability in captu...
Nick Russell, Wil M. P. van der Aalst, Arthur H. M...