In this paper, we present our approach to a visual refactoring tool, the Type Access Analyzer (TAA), which uses program analysis to detect code smells and for suggesting and perfo...
Philip Mayer, Andreas Meissner, Friedrich Steimann
In this paper, we present an application of 0-1 linear programming problem in the indentification of the nondominated paths on a network. To find efficient paths, an adaptationof t...
Gholam Reza Jahanshahloo, F. Hosseinzadeh Lotfi, N...
Two practical paradigms are presented, which facilitate domain concepts to be directly used to model business operations: the first paradigm is based on the business artifacts and...
Wei Zhao, Barrett R. Bryant, Fei Cao, Kamal Bhatta...
Our goal in this paper is to introduce and motivatea methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion ...
Paolo Bresciani, Anna Perini, Paolo Giorgini, Faus...
In this paper we define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of prin...