Buscar
Mostrando ítems 1-10 de 30
Ponencia
How to develop secure applications with Aspect-Oriented Programming
(IEEE Computer Society, 2013)
In the last few years several new programming techniques for achieving a better separation of concerns have been defined. One of the most accepted has been Aspect-Oriented Programming (AOP). Those attending this tutorial ...
Artículo
Measuring Performance in Knowledge Intensive Processes
(ACM Digital Library, 2019)
Knowledge-Intensive Processes (KIPs) are processes whose execution is heavily dependent on knowledge workers performing various interconnected knowledge-intensive decision-making tasks. Among other characteristics, KIPs ...
Artículo
Automatic verification and validation wizard in web-centred end-user software engineering
(Elsevier, 2017)
This paper addresses one of the major web end-user software engineering (WEUSE) challenges, namely, how to verify and validate software products built using a life cycle enacted by end-user programmers. Few end-user development ...
Artículo
Blockchains for Business Process Management - Challenges and Opportunities
(ACM Digital Library, 2018)
Blockchain technology offers a sizable promise to rethink the way interorganizational business processes are managed because of its potential to realize execution without a central party serving as a single point of trust ...
Ponencia
Towards Assessing Open Source Communities' Health using SOC Concepts
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2015)
Quality of an open source software ecosystem (OSS ecosystem) is key for different ecosystem actors such as contributors or adopters. In fact, the consideration of several quality aspects(e.g., activeness, visibility, ...
Artículo
Enabling customers engagement and collaboration for small and medium-sized enterprises in ubiquitous multi-channel ecosystems
(Elsevier, 2014)
Over the last few years, we have encountered an exponential growth in online communication opportunities. Organizations have more and more ways to connect and engage with their current or future customers. The existence ...
Artículo
An approach for deploying and monitoring dynamic security policies
(Elsevier, 2016)
Security policies are enforced through the deployment of certain security functionalities within the applications. When the security policies dynamically change, the associated security functionalities currently deployed ...
Ponencia
Artículo
Reverse engineering language product lines from existing DSL variants
(Elsevier, 2017)
The use of domain-specific languages (DSLs) has become a successful technique to develop complex sys tems. In this context, an emerging phenomenon is the existence of DSL variants, which are different versions of a DSL ...
Ponencia
DMN for Data Quality Measurement and Assessment
(Springer, 2019)
Data Quality assessment is aimed at evaluating the suitability of a dataset for an intended task. The extensive literature on data quality describes the various methodologies for assessing data quality by means of data ...