Sciweavers

1735 search results - page 102 / 347
» Using UML for Business Object Based Systems Modeling
Sort
View
122
Voted
EDOC
1997
IEEE
15 years 7 months ago
A Policy Based Role Object Model
Enterprise roles define the duties and responsibilities of the individuals which are assigned to them. This paper introduces a framework for the management of large distributed sy...
Emil Lupu, Morris Sloman
AGTIVE
2003
Springer
15 years 8 months ago
Integrating Graph Rewriting and Standard Software Tools
OptimixJ is a graph rewrite tool that can be embedded easily into the standard software process. Applications and models can be developed in Java or UML and extended by graph rewri...
Uwe Aßmann, Johan Lövdahl
115
Voted
IRI
2006
IEEE
15 years 9 months ago
Modeling methodology for component reuse and system integration for hurricane loss projection application
Hurricanes are one of the deadliest and perilous natural calamities on the face of earth having a severe impact both on the lives of the people and economy of a nation. Attempts h...
Kasturi Chatterjee, Khalid Saleem, Na Zhao, Min Ch...
HICSS
2002
IEEE
143views Biometrics» more  HICSS 2002»
15 years 8 months ago
Business Intelligence in Healthcare Organizations
The management of healthcare organizations starts to recognize the relevance of the definition of care products in relation to management information. In the turmoil between costs...
Ton A. M. Spil, Robert A. Stegwee, Christian J. A....
117
Voted
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
15 years 9 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard