Sciweavers

1928 search results - page 242 / 386
» Integrity Constraints in OWL
Sort
View
KBSE
2003
IEEE
14 years 3 months ago
A Model-Driven Approach to Non-Functional Analysis of Software Architectures
We present an approach to managing formal models using Model Driven Architecture (MDA) technologies that delivers analysis techniques through integration with the design tools and...
James Skene, Wolfgang Emmerich
ICCBSS
2003
Springer
14 years 3 months ago
Protective Wrapper Development: A Case Study
We have recently proposed a general approach to engineering protective wrappers as a means of detecting errors or unwanted behaviour in systems employing an OTS (Off-The-Shelf) ite...
Tom Anderson, Mei Feng, Steve Riddle, Alexander B....
ACIIDS
2009
IEEE
162views Database» more  ACIIDS 2009»
14 years 3 months ago
Deriving Conceptual Schema from XML Databases
In this paper, two concepts from different research areas are addressed together, namely functional dependency (FD) and multidimensional association rule (MAR). FD is a class of i...
Oviliani Yenty Yuliana, Suphamit Chittayasothorn
DATE
2010
IEEE
121views Hardware» more  DATE 2010»
14 years 3 months ago
Cost modeling and cycle-accurate co-simulation of heterogeneous multiprocessor systems
—In this paper, we present a method to analyze different implementations of stream-based applications on heterogeneous multiprocessor systems. We take both resource usage and per...
Sven van Haastregt, Eyal Halm, Bart Kienhuis
ACSC
2002
IEEE
14 years 3 months ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered