Sciweavers

53 search results - page 8 / 11
» Secrecy UML Method for Model Transformations
Sort
View
MOMPES
2007
IEEE
15 years 3 months ago
Adopting Computational Independent Models for Derivation of Architectural Requirements of Software Product Lines
The alignment of the software architecture and the functional requirements of a system is a demanding task because of the difficulty in tracing design elements to requirements. Th...
Alexandre Bragança, Ricardo Jorge Machado
82
Voted
ICWE
2004
Springer
15 years 2 months ago
Getting Ready Web Engineering Methods for the Semantic Web
Current Web Engineering methods develop "closed" web applications from conceptual models. This fact makes difficult the integration and the interoperability of different ...
Victoria Torres, Joan Fons, Oscar Asensi, Vicente ...
AUTOMOTIVEUI
2009
ACM
15 years 4 months ago
Towards a flexible UI model for automotive human-machine interaction
In this paper we present an approach for creating user infrom abstract representations for the automotive domain. The approach is based on transformations between different user ...
Guido M. de Melo, Frank Honold, Michael Weber, Mar...
FASE
2008
Springer
14 years 11 months ago
Verification of Architectural Refactorings by Rule Extraction
With the success of model-driven development as well as component-based and service-oriented systems, models of software architecture are key artefacts in the development process. ...
Dénes Bisztray, Reiko Heckel, Hartmut Ehrig
94
Voted
AGTIVE
2007
Springer
15 years 3 months ago
Assuring Consistency of Business Process Models and Web Services Using Visual Contracts
Abstract. Business process models describe workflows by a set of actions together with their ordering. When implementing business processes within a service-oriented architecture,...
Gregor Engels, Baris Güldali, Christian Solte...