Sciweavers

729 search results - page 88 / 146
» Supporting Use-Case Reviews
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 6 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
MIDDLEWARE
2007
Springer
15 years 6 months ago
R-OSGi: Distributed Applications Through Software Modularization
In this paper we take advantage of the concepts developed for centralized module management, such as dynamic loading and unloading of modules, and show how they can be used to supp...
Jan S. Rellermeyer, Gustavo Alonso, Timothy Roscoe
BPM
2005
Springer
97views Business» more  BPM 2005»
15 years 5 months ago
Service Interaction Patterns
Abstract. With increased sophistication and standardization of modeling languages and execution platforms supporting business process management (BPM) across traditional boundaries...
Alistair P. Barros, Marlon Dumas, Arthur H. M. ter...
GI
2009
Springer
15 years 4 months ago
Applying Semantic Technologies for Context-Aware AAL Services: What we can learn from SOPRANO
Abstract: Ambient assisted living (AAL) is a newly emerging term describing a research area with focus on services that support people in their daily life with particular focus on ...
Peter Wolf, Andreas Schmidt, Michael Klein
TOOLS
1997
IEEE
15 years 4 months ago
Mapping the OO-Jacobson Approach into Function Point Analysis
Function Point Analysis measures user requested functionality independent of the technology used for implementation. Software applications are represented stract model that contai...
T. Fetcke, A. Abran, T.-H. Nguyen