Sciweavers

3792 search results - page 195 / 759
» Techniques for Trusted Software Engineering
Sort
View
SIGADA
2005
Springer
15 years 9 months ago
Modeling SPARK systems with UML
In this paper, we will consider two aspects of UML in order to assess how well suited it is for modeling SPARK systems. The first aspect is the ability to represent SPARK in UML f...
Xavier Sautejeau
AOSD
2007
ACM
15 years 8 months ago
Expressive programs through presentation extension
Most approaches to programming language extensibility have worked by pairing syntactic extension with semantic extension. We present an approach that works through a combination o...
Andrew David Eisenberg, Gregor Kiczales
AOSD
2007
ACM
15 years 6 months ago
The service creation environment: a telecom case study
Composing web services using current web service composition languages (such as BPEL) requires a large amount of in-depth knowledge. This paper introduces a service creation envir...
Niels Joncheere
FASE
2005
Springer
15 years 9 months ago
Termination Criteria for Model Transformation
Model Transformation has become central to most software engineering activities. It refers to the process of modifying a (usually graphical) model for the purpose of analysis (by i...
Hartmut Ehrig, Karsten Ehrig, Juan de Lara, Gabrie...
146
Voted
JTAER
2007
160views more  JTAER 2007»
15 years 4 months ago
Enabling Knowledge Sharing within e-Government Back-Office Through Ontological Engineering
Nowadays, organizational innovation constitutes the government challenges for providing better and more efficient services to citizens, enterprises or other public offices. E–go...
Graciela Brusa, María Laura Caliusco, Omar ...