Sciweavers

340 search results - page 35 / 68
» Validating Business Requirements Using MAS Analysis Models
Sort
View
ICRE
1996
IEEE
15 years 4 months ago
GeoOOA: Object-Oriented Analysis for Geographic Information Systems
We stress the need of a domain-tailored requirements engineering method for the development of GISapplications. To this end, we discuss three GISapplication scenarios, the so-call...
Georg Kösters, Bernd-Uwe Pagel, Hans-Werner S...
105
Voted
SIGSOFT
2007
ACM
16 years 1 months ago
Model checking service compositions under resource constraints
When enacting a web service orchestration defined using the Business Process Execution Language (BPEL) we observed various safety property violations. This surprised us considerab...
David S. Rosenblum, Howard Foster, Jeff Kramer, Je...
CCR
2008
84views more  CCR 2008»
15 years 20 days ago
Modeling internet topology dynamics
Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. Whi...
Hamed Haddadi, Steve Uhlig, Andrew W. Moore, Richa...
90
Voted
WWW
2007
ACM
16 years 1 months ago
A high-performance interpretive approach to schema-directed parsing
XML delivers key advantages in interoperability due to its flexibility, expressiveness, and platform-neutrality. As XML has become a performance-critical aspect of the next genera...
Morris Matsa, Eric Perkins, Abraham Heifets, Marga...
231
Voted
ECOOP
2009
Springer
16 years 1 months ago
Fine-Grained Access Control with Object-Sensitive Roles
Role-based access control (RBAC) is a common paradigm to ensure that users have sufficient rights to perform various system operations. In many cases though, traditional RBAC does ...
Jeffrey Fischer, Daniel Marino, Rupak Majumdar, To...