Sciweavers

496 search results - page 88 / 100
» Using the Temporal Logic RDL for Design Specifications
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
HT
2004
ACM
15 years 3 months ago
Hypertext versioning for embedded link models
In this paper, we describe Chrysant, a hypertext version control system for embedded link models. Chrysant provides generalpurpose versioning capability to hypertext systems with ...
Kai Pan, E. James Whitehead Jr., Guozheng Ge
JISBD
2001
14 years 11 months ago
Conceptual Modeling of Device-Independent Web Applications
Existing tools intended to build and deploy engaging complex Web sites (including functionality) have shown to be inadequate to face the software production process in an unified a...
Jaime Gómez, Cristina Cachero
70
Voted
WSC
1998
14 years 11 months ago
SDI INDUSTRY: An Extend-based Tool for Continuous and High-Speed Manufacturing
Continuous or high-speed manufacturing equipment is an integral part of the food and beverage, pharmaceutical, and consumer products industries. For many years, these industries h...
Andrew J. Siprelle, Richard A. Phelps, M. Michelle...
CIDR
2009
136views Algorithms» more  CIDR 2009»
14 years 10 months ago
The Role of Schema Matching in Large Enterprises
To date, the principal use case for schema matching research has been as a precursor for code generation, i.e., constructing mappings between schema elements with the end goal of ...
Ken Smith, Michael Morse, Peter Mork, Maya Hao Li,...