Sciweavers

756 search results - page 80 / 152
» M-Modeler: a framework implementation for modeling m-commerc...
Sort
View
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
14 years 3 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung
CIKM
2011
Springer
12 years 9 months ago
Ranking-based processing of SQL queries
A growing number of applications are built on top of search engines and issue complex structured queries. This paper contributes a customisable ranking-based processing of such qu...
Hany Azzam, Thomas Roelleke, Sirvan Yahyaei
ICSE
2009
IEEE-ACM
14 years 1 months ago
A compositional approach to bidirectional model transformation
Bidirectional model transformation plays an important role in maintaining consistency between two models, and has many potential applications in software development, including mo...
Soichiro Hidaka, Zhenjiang Hu, Hiroyuki Kato, Keis...
ICSE
2004
IEEE-ACM
14 years 9 months ago
Elaborating Security Requirements by Construction of Intentional Anti-Models
Caring for security at requirements engineering time is a message that has finally received some attention recently. However, it is not yet very clear how to achieve this systemat...
Axel van Lamsweerde
ECTEL
2007
Springer
14 years 3 months ago
Model Driven E-Learning Platform Integration
The success of the e-learning paradigm observed in recent times created a growing demand for e-learning systems in universities and other educational institutions, that itself led ...
Zuzana Bizonova