Sciweavers

JSW
2008
131views more  JSW 2008»
13 years 11 months ago
An Application Directed Adaptive Framework for Autonomic Software
Autonomic computing is gradually becoming accepted as a viable approach to achieving self-management in systems and networks, with the goal of lessening the impact of the complexit...
Bridget Meehan, Girijesh Prasad, T. Martin McGinni...
IADIS
2004
14 years 17 days ago
A first approximation to estimate the usability of a software application task
Our objective is to obtain the level of usability of a software application over the different tasks for which it has been developed. Nowadays, usability is measured through diffe...
M. González Aparicio, José Antonio L...
UML
2001
Springer
14 years 3 months ago
UML Modelling and Performance Analysis of Mobile Software Architectures
Modern distributed software applications generally operate in complex and heterogeneous computing environments (like the World Wide Web). Different paradigms (client-server, mobili...
Vincenzo Grassi, Raffaela Mirandola
COMPSAC
2002
IEEE
14 years 4 months ago
Software Application Platforms: From Product Architecture to Integrated Application Strategy
One promising approach to more effective software development is the concept of product platform originated from mechanical engineering, aiming at architectural product families i...
Markku Sääksjärvi
GI
2005
Springer
14 years 4 months ago
Programming in the Large based on the Business Process Modelling Notation
: A software application is related to the processes it supports. Today, UML diagrams esp. use case diagrams and activity diagrams are often used to model the relevant aspects of t...
Christian Emig, Christof Momm, Jochen Weisser, Seb...
AICT
2006
IEEE
128views Communications» more  AICT 2006»
14 years 5 months ago
Development of SOA-Based Software Systems - an Evolutionary Programming Approach
A software application has strong relationships with the business processes it supports. In the analysis phase those parts of the processes in which the software system is applied...
Christian Emig, Jochen Weisser, Sebastian Abeck
COMPSAC
2009
IEEE
14 years 6 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...