This is TikiWiki v1.9.8.3 -Sirius- © 2002–2007 by the Tiki community Fri 03 of May, 2024 [03:09 UTC]
Menu

Category D. Software

Browse in:
All Wiki pages Image galleries Images File galleries Blogs Trackers Items Surveys Articles

search category: deep:

Hide subcategories objects

Current category: Top  ::  ITHEA Classification Structure  ::  D. Software
..
 

Objects (159)

D.2.6 Programming Environments Article BUSINESS PROCESSES MODELLING WITH DSM PLATFORM AT INTEGRATED SYSTEMS DEVELOPMENT Abstract: The first and most labor-consuming stage of information systems development is an analysis stage. At this stage the set of different formal models describing systems domains, different aspe 
D.2.1 Requirements/Specifications Article COMPARATIVE ANALYSIS OF THE LANGUAGES FOR BUSINESS RULES SPECIFICATION Abstract: One of the goals of authors of the Business Rules Approach, besides making the process of specification of software more precise and adequate, was to provide a rigorous basis for reverse en 
D.2 SOFTWARE ENGINEERING Article COMPLEX PROTECTION SYSTEM OF METADATA-BASED DISTRIBUTED Abstract: A description of architecture and approaches to the implementation of a protection system of metadatabased adaptable information systems is suggested. Various protection means are examined. 
D.4.6 Security and Protection Article CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of parti 
D.2.11 Software ArchitecturesArticle CONSTRUCTION OF MORPHOSYNTACTIC DISTANCE ON SEMANTIC STRUCTURES Abstract: When a natural language is introduced in a computer we have several problems to automate it, this is because it is difficult to make a computer relate concepts in a rich and always changing 
D.2.13 Reusable SoftwareArticle CORE DESIGN PATTERN FOR EFFICIENT MULTI-AGENT ARCHITECTURE Abstract: Interaction engineering is fundamental for agent based systems. In this paper we will present a design pattern for the core of a multi-agent platform - the message communication and behavio 
D.4.6 Security and Protection Article CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In contrast to traditional biometric systems, proposed algorithm does not authenticate user by  
D.2 SOFTWARE ENGINEERING Article DATA INDEPENDENCE IN THE MULTI-DIMENSIONAL NUMBERED INFORMATION SPACES Abstract: The concept of data independence designates the techniques that allow data to be changed without affecting the applications that process it. The different structures of the information base 
D.1 PROGRAMMING TECHNIQUES Article DELIMITED MASSIVELY PARALLEL ALGORITHM BASED ON RULES ELIMINATION Abstract: In the field of Transition P systems implementation, it has been determined that it is very important to determine in advance how long takes evolution rules application in membranes. Moreov 
D.2.9 Management Article DEPENDENCE OF INFORMATION AND TELECOMMUNICATION TECHNOLOGY DEVELOPMENT ... Abstract: The article describes an analysis of the relationships between different ICT services indicators and economic indicators. Article also gives view for determining the impact of the economic  
D.2 SOFTWARE ENGINEERING Article DESIGN STANDARDIZED WEB-COMPONENTS FOR E-LEARNING Abstract: In this paper a flexible approach to design LMS with QTI Ready component based on the e-Learning standards AICC and IMS QTI is described. This system and component permits a dynamic learnin 
D.2.2 Design Tools and TechniquesArticle DEVELOPMENT OF THE COMBINED METHOD FOR DESIGNING DATAFLOW SYSTEMS Abstract: The methods of designing of information systems for large organizations are considered in the paper. The structural and object-oriented approaches are compared. For the practical realizatio 
D.2.12 InteroperabilityArticle ENVIRONMENTAL RISK ASSESSMENT USING GEOSPATIAL DATA AND INTELLIGENT METHODS Abstract: In this paper, we describe intelligent methods and technologies for environmental risks assessment using geospatial data. The risk assessment process is based on fusion of data acquired from 
D.4.6 Security and Protection Article EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... Abstract: The principal methods of compression and different types of non-encrypted objects are described. An analysis is made of the results obtained from examinations of the speed of compression fo 
D.2.2 Design Tools and TechniquesArticle EXPERIENCES ON APPLICATION GENERATORS Abstract: The National Institute for Statistics is the organism responsible for acquiring economical data for governmental statistics purposes. Lisbon agreements establish a framework in which this a 
D.2.4 Software/Program VerificationArticle EXTENDED ALGORITHM FOR TRANSLATION OF MSC-DIAGRAMS INTO PETRI NETS Abstract: The article presents an algorithm for translation the system, described by MSC document into Petri Net modulo strong bisimulation. Obtained net can be later used for determining various sys 
D.2.4 Software/Program VerificationArticle EXTENDED ALGORITHM FOR TRANSLATION OF MSC-DIAGRAMS INTO PETRI NETS Abstract: The article presents an algorithm for translation the system, described by MSC document into ordinary Petri Net modulo strong bisimulation. Only the statical properties of MSC document are e 
D.2.1 Requirements/Specifications Article EXTRACTING BUSINES RULES – HYPE OR HOPE FOR SOFTWARE MODERNIZATION Abstract: The purpose of this work is to investigate how the Business Rules approach (very promising) can be used for the purposes of feasible and efficient software modernization (very needed). The p 
D.1.m Miscellaneous Article FAST LINEAR ALGORITHM FOR ACTIVE RULES APPLICATION IN TRANSITION P SYSTEMS Abstract: Transition P systems are computational models based on basic features of biological membranes and the observation of biochemical processes. In these models, membrane contains objects multis 
D.1.m Miscellaneous Article FAST LINEAR ALGORITHM FOR ACTIVE RULES APPLICATION IN TRANSITION P SYSTEMS Abstract: Transition P systems are computational models inspired on basic features of biological membranes and the observation of biochemical processes. In these models, membrane contains objects mult 
D.2.2 Design Tools and TechniquesArticle FRAMEWORK FOR CREATING SINGLE INFORMATION WINDOWS Abstract: We consider a software development and support of single information window, which is a web-based software system. Describe the architecture of the system. Attention is focused on the use of 
D.4.3 File Systems Management Article GENERAL STRUCTURE OF COLLECT/REPORT PARADIGM FOR STORING AND ACCESSING BIG DATA Abstract: The general structure of Collect/Report Paradigm (CRP) is outlined in this paper. CRP is a new approach for storing and accessing large amounts of data. Main advantages of CRP are: (1) col 

[prev]  Page: 2/7  [next]
1   2   3   4   5   6   7  
World Clock
Powered by Tikiwiki Powered by PHP Powered by Smarty Powered by ADOdb Made with CSS Powered by RDF powered by The PHP Layers Menu System
RSS Wiki RSS Blogs rss Articles RSS Image Galleries RSS File Galleries RSS Forums RSS Maps rss Calendars
[ Execution time: 0.22 secs ]   [ Memory usage: 9.12MB ]   [ GZIP Disabled ]   [ Server load: 0.72 ]