Search
Now showing items 1-10 of 16
Presentation
How to develop secure applications with Aspect-Oriented Programming
(IEEE Computer Society, 2013)
In the last few years several new programming techniques for achieving a better separation of concerns have been defined. One of the most accepted has been Aspect-Oriented Programming (AOP). Those attending this tutorial ...
Article
Measuring Performance in Knowledge Intensive Processes
(ACM Digital Library, 2019)
Knowledge-Intensive Processes (KIPs) are processes whose execution is heavily dependent on knowledge workers performing various interconnected knowledge-intensive decision-making tasks. Among other characteristics, KIPs ...
Article
Automatic verification and validation wizard in web-centred end-user software engineering
(Elsevier, 2017)
This paper addresses one of the major web end-user software engineering (WEUSE) challenges, namely, how to verify and validate software products built using a life cycle enacted by end-user programmers. Few end-user development ...
Article
A Survey on Energy Expenditure Estimation Using Wearable Devices
(ACM, 2020-09)
Human Energy Expenditure (EE) is a valuable tool for measuring physical activity and its impact on our body in an objective way. To accurately measure the EE, there are methods such as doubly labeled water and direct and ...
Presentation
Towards Assessing Open Source Communities' Health using SOC Concepts
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2015)
Quality of an open source software ecosystem (OSS ecosystem) is key for different ecosystem actors such as contributors or adopters. In fact, the consideration of several quality aspects(e.g., activeness, visibility, ...
Article
An approach for deploying and monitoring dynamic security policies
(Elsevier, 2016)
Security policies are enforced through the deployment of certain security functionalities within the applications. When the security policies dynamically change, the associated security functionalities currently deployed ...
Article
Reverse engineering language product lines from existing DSL variants
(Elsevier, 2017)
The use of domain-specific languages (DSLs) has become a successful technique to develop complex sys tems. In this context, an emerging phenomenon is the existence of DSL variants, which are different versions of a DSL ...
Presentation
Injecting Quality Attributes into Software Architectures with the Common Variability Language
(ACM Digital Library, 2014)
Quality attributes that add new behavior to the functional software architecture are known as functional quality attributes (FQAs). These FQAs are applied to pieces of software from small components to entire systems, ...
Article
A template-based approach for responsibility management in executable business processes
(Taylor and Francis, 2018)
Process-oriented organisations need to manage the different types of responsibilities their employees may have w.r.t. the activities involved in their business processes. Despite several approaches provide support ...
Article
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
(MDPI, 2015)
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications ...