—Formal models are often used to verify systems and prove their correctness, and ensure that transformed models remain consistent to the original system. However, formal techniqu...
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
In this paper we present a model-based approach to integrate dynamic and volatile functionality in Web Applications. Our approach comprises an extension to the OOHDM design method...
Gustavo Rossi, Andres Nieto, Luciano Mengoni, Nahu...
Future business applications will often have more than 2,000 forms and need to target several user interface (UI) technologies including: Web Browsers, Windows® Applications, PDA...
Faceted and dynamic taxonomies are increasingly used nowadays in a plethora of applications. For developing user interfaces grounded on this interaction paradigm, it is advantageo...