Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Abstract. We describe MIDST, an implementation of the model management operator ModelGen, which translates schemas from one model to another, for example from OO to SQL or from SQL...
Paolo Atzeni, Paolo Cappellari, Philip A. Bernstei...
In this short paper, the basic ideas behind a project on the application of Knowledge Representation formalisms and technologies for Conceptual Modelling and Query Management are ...
Although knowledge management (KM) has been examined in previous research, the utilization of KM technologies is still not well understood. Hence, in this study, a model was devel...
The research presented in this paper is part of a larger study of the organizational impacts of information systems on knowledge work. The phase of the research reported in the pa...