Sciweavers

1779 search results - page 256 / 356
» Requirements Engineering and Agile Software Development
Sort
View
FASE
2009
Springer
15 years 11 months ago
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks
Abstract. E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in...
Frank Hermann, Hartmut Ehrig, Claudia Ermel
CSSW
2007
15 years 6 months ago
Semantic Integrator: Semi-Automatically Enhancing Social Semantic Web Environments
Abstract: Large amounts of information from various sources have often to be considered when collaboratively developing semantic structures. Examining all relevant information can ...
Steffen Lohmann, Philipp Heim, Jürgen Ziegler
DEBU
2008
90views more  DEBU 2008»
15 years 4 months ago
Data Aggregation, Heterogeneous Data Sources and Streaming Processing: How Can XQuery Help?
Software infrastructures and applications more and more must deal with data available in a variety of different storage engines, accessible through a multitude of protocols and in...
Marc Van Cappellen, Wouter Cordewiner, Carlo Innoc...
159
Voted
SELMAS
2005
Springer
15 years 10 months ago
Policy-Driven Configuration and Management of Agent Based Distributed Systems
In this paper, we demonstrate a policy based approach for building and managing large scale agent based systems. We identify different classes of policies for agent based componen...
Anand R. Tripathi, Devdatta Kulkarni, Tanvir Ahmed
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 8 months ago
Human competitive security protocols synthesis
This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication ...
Hao Chen, John A. Clark, Jeremy Jacob