Sciweavers

3555 search results - page 589 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
IWCMC
2010
ACM
15 years 1 months ago
Policy-driven workflows for mobile network management automation
Future wireless networks will experience a continuous growth regarding the number of network elements with increasingly complex interrelations between the configuration of multipl...
Raphael Romeikat, Bernhard Bauer, Tobias Bandh, Ge...
103
Voted
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
15 years 8 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
VL
2008
IEEE
115views Visual Languages» more  VL 2008»
15 years 8 months ago
Flexible visualization of automatic simulation based on structured graph transformation
Visual modeling languages for discrete behavior modeling allow the modeler to describe how systems develop over time during system runs. Models of these languages are the basis fo...
Enrico Biermann, Claudia Ermel, Jonas Hurrelmann, ...
WWW
2005
ACM
15 years 7 months ago
Hera presentation generator
Semantic Web Information Systems (SWIS) are Web Information Systems that use Semantic Web technologies. Hera is a modeldriven design methodology for SWIS. In Hera, models are repr...
Flavius Frasincar, Geert-Jan Houben, Peter Barna
BPM
2005
Springer
102views Business» more  BPM 2005»
15 years 7 months ago
Integrating Process Learning and Process Evolution - A Semantics Based Approach
Companies are developing a growing interest in aligning their information systems in a process-oriented way. However, current processaware information systems (PAIS) fail to meet p...
Stefanie Rinderle, Barbara Weber, Manfred Reichert...