D.2.6 Programming Environments | Article |
BUSINESS PROCESSES MODELLING WITH DSM PLATFORM AT INTEGRATED SYSTEMS DEVELOPMENT |
Abstract: The first and most labor-consuming stage of information systems development is an analysis stage. At
this stage the set of different formal models describing systems domains, different aspe |
D.2.1 Requirements/Specifications | Article |
COMPARATIVE ANALYSIS OF THE LANGUAGES FOR BUSINESS RULES SPECIFICATION |
Abstract: One of the goals of authors of the Business Rules Approach, besides making the process of
specification of software more precise and adequate, was to provide a rigorous basis for reverse en |
D.2 SOFTWARE ENGINEERING | Article |
COMPLEX PROTECTION SYSTEM OF METADATA-BASED DISTRIBUTED |
Abstract: A description of architecture and approaches to the implementation of a protection system of metadatabased
adaptable information systems is suggested. Various protection means are examined. |
D.4.6 Security and Protection | Article |
CONCEPTUAL MODEL AND SECURITY REQUIREMENTS FOR DRM TECHNIQUES ... |
Abstract: This paper deals with the security problems of DRM protected e-learning content. After a short review
of the main DRM systems and methods used in e-learning, an examination is made of parti |
D.2.11 Software Architectures | Article |
CONSTRUCTION OF MORPHOSYNTACTIC DISTANCE ON SEMANTIC STRUCTURES |
Abstract: When a natural language is introduced in a computer we have several problems to automate it, this is
because it is difficult to make a computer relate concepts in a rich and always changing |
D.2.13 Reusable Software | Article |
CORE DESIGN PATTERN FOR EFFICIENT MULTI-AGENT ARCHITECTURE |
Abstract: Interaction engineering is fundamental for agent based systems. In this paper we will present a design
pattern for the core of a multi-agent platform - the message communication and behavio |
D.4.6 Security and Protection | Article |
CORRELATION-BASED PASSWORD GENERATION FROM FINGERPRINTS |
Abstract: In this paper, a methodology for reliable password generation from fingerprints is developed. In
contrast to traditional biometric systems, proposed algorithm does not authenticate user by |
D.2 SOFTWARE ENGINEERING | Article |
DATA INDEPENDENCE IN THE MULTI-DIMENSIONAL NUMBERED INFORMATION SPACES |
Abstract: The concept of data independence designates the techniques that allow data to be changed without
affecting the applications that process it. The different structures of the information base |
D.1 PROGRAMMING TECHNIQUES | Article |
DELIMITED MASSIVELY PARALLEL ALGORITHM BASED ON RULES ELIMINATION |
Abstract: In the field of Transition P systems implementation, it has been determined that it is very important to
determine in advance how long takes evolution rules application in membranes. Moreov |
D.2.9 Management | Article |
DEPENDENCE OF INFORMATION AND TELECOMMUNICATION TECHNOLOGY DEVELOPMENT ... |
Abstract: The article describes an analysis of the relationships between different ICT services indicators and
economic indicators. Article also gives view for determining the impact of the economic |
D.2 SOFTWARE ENGINEERING | Article |
DESIGN STANDARDIZED WEB-COMPONENTS FOR E-LEARNING |
Abstract: In this paper a flexible approach to design LMS with QTI Ready component based on the e-Learning
standards AICC and IMS QTI is described. This system and component permits a dynamic learnin |
D.2.2 Design Tools and Techniques | Article |
DEVELOPMENT OF THE COMBINED METHOD FOR DESIGNING DATAFLOW SYSTEMS |
Abstract: The methods of designing of information systems for large organizations are considered in the paper.
The structural and object-oriented approaches are compared. For the practical realizatio |
D.2.12 Interoperability | Article |
ENVIRONMENTAL RISK ASSESSMENT USING GEOSPATIAL DATA AND INTELLIGENT METHODS |
Abstract: In this paper, we describe intelligent methods and technologies for environmental risks assessment using geospatial data. The risk assessment process is based on fusion of data acquired from |
D.4.6 Security and Protection | Article |
EXAMINATION OF PASSWORDS’ INFLUATION ON THE COMPRESSING PROCESS ... |
Abstract: The principal methods of compression and different types of non-encrypted objects are described. An
analysis is made of the results obtained from examinations of the speed of compression fo |
D.2.2 Design Tools and Techniques | Article |
EXPERIENCES ON APPLICATION GENERATORS |
Abstract: The National Institute for Statistics is the organism responsible for acquiring economical data for
governmental statistics purposes. Lisbon agreements establish a framework in which this a |
D.2.4 Software/Program Verification | Article |
EXTENDED ALGORITHM FOR TRANSLATION OF MSC-DIAGRAMS INTO PETRI NETS |
Abstract: The article presents an algorithm for translation the system, described by MSC document into Petri Net
modulo strong bisimulation. Obtained net can be later used for determining various sys |
D.2.4 Software/Program Verification | Article |
EXTENDED ALGORITHM FOR TRANSLATION OF MSC-DIAGRAMS INTO PETRI NETS |
Abstract: The article presents an algorithm for translation the system, described by MSC document into ordinary Petri Net modulo strong bisimulation. Only the statical properties of MSC document are e |
D.2.1 Requirements/Specifications | Article |
EXTRACTING BUSINES RULES – HYPE OR HOPE FOR SOFTWARE MODERNIZATION |
Abstract: The purpose of this work is to investigate how the Business Rules approach (very promising) can be used for the purposes of feasible and efficient software modernization (very needed). The p |
D.1.m Miscellaneous | Article |
FAST LINEAR ALGORITHM FOR ACTIVE RULES APPLICATION IN TRANSITION P SYSTEMS |
Abstract: Transition P systems are computational models based on basic features of biological membranes and
the observation of biochemical processes. In these models, membrane contains objects multis |
D.1.m Miscellaneous | Article |
FAST LINEAR ALGORITHM FOR ACTIVE RULES APPLICATION IN TRANSITION P SYSTEMS |
Abstract: Transition P systems are computational models inspired on basic features of biological membranes and the observation of biochemical processes. In these models, membrane contains objects mult |
D.2.2 Design Tools and Techniques | Article |
FRAMEWORK FOR CREATING SINGLE INFORMATION WINDOWS |
Abstract: We consider a software development and support of single information window, which is a web-based software system. Describe the architecture of the system. Attention is focused on the use of |
D.4.3 File Systems Management | Article |
GENERAL STRUCTURE OF COLLECT/REPORT PARADIGM FOR STORING AND ACCESSING BIG DATA |
Abstract: The general structure of Collect/Report Paradigm (CRP) is outlined in this paper. CRP is a
new approach for storing and accessing large amounts of data. Main advantages of CRP are:
(1) col |