Buscar
Mostrando ítems 1-10 de 14
Ponencia
How to develop secure applications with Aspect-Oriented Programming
(IEEE Computer Society, 2013)
In the last few years several new programming techniques for achieving a better separation of concerns have been defined. One of the most accepted has been Aspect-Oriented Programming (AOP). Those attending this tutorial ...
Artículo
Measuring Performance in Knowledge Intensive Processes
(ACM Digital Library, 2019)
Knowledge-Intensive Processes (KIPs) are processes whose execution is heavily dependent on knowledge workers performing various interconnected knowledge-intensive decision-making tasks. Among other characteristics, KIPs ...
Ponencia
Towards Assessing Open Source Communities' Health using SOC Concepts
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2015)
Quality of an open source software ecosystem (OSS ecosystem) is key for different ecosystem actors such as contributors or adopters. In fact, the consideration of several quality aspects(e.g., activeness, visibility, ...
Artículo
Reverse engineering language product lines from existing DSL variants
(Elsevier, 2017)
The use of domain-specific languages (DSLs) has become a successful technique to develop complex sys tems. In this context, an emerging phenomenon is the existence of DSL variants, which are different versions of a DSL ...
Ponencia
Injecting Quality Attributes into Software Architectures with the Common Variability Language
(ACM Digital Library, 2014)
Quality attributes that add new behavior to the functional software architecture are known as functional quality attributes (FQAs). These FQAs are applied to pieces of software from small components to entire systems, ...
Artículo
A template-based approach for responsibility management in executable business processes
(Taylor and Francis, 2018)
Process-oriented organisations need to manage the different types of responsibilities their employees may have w.r.t. the activities involved in their business processes. Despite several approaches provide support ...
Artículo
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
(MDPI, 2015)
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications ...
Ponencia
Runtime Enforcement of Dynamic Security Policies
(Springer, 2014)
The security policies of an application can change at runtime due to several reasons, as for example the changes on the user preferences, the lack of enough resources in mobile environments or the negotiation of security ...
Ponencia
An Aspect-Oriented Model Transformation to Weave Security using CVL
(IEEE Computer Society, 2014)
In this paper, we combine the Common Variability Language (CVL) and the ATL Transformation Language to customize and incorporate a generic security model into any application that requires security. Security spans a large ...
Ponencia
Un Enfoque Basado en Modelos para la Toma de Decisiones Colaborativa en la Cadena de Suministro
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2013)
En el entorno empresarial actual la colaboración en la toma de decisiones se ha convertido en un elemento clave para mejorar la competividad. Hay numerosos estudios orientados a crear modelos formales de procesos en la CdS ...