Prologue -- Walk-through: Using UML for Security -- Background -- Developing Secure Systems -- Model-based Security Engineering with UML -- Applications -- Tool Support -- Tool support for UMLsec -- A Formal Foundation -- Formal Systems Development with UML -- Epilogue -- Further Material -- Outlook.Attacks against computer systems can cause considerable economic or physical damage. High-qualit…
Language Issues -- ULF-Ware – An Open Framework for Integrated Tools for ITU-T Languages -- An Access Control Language for Dynamic Systems – Model-Driven Development and Verification -- Non-deterministic Constructs in OCL – What Does any() Mean -- Engineering Issues -- Integrating RT-CORBA in SDL -- Component Development: MDA Based Transformation from eODL to CIDL -- Service Discovery and…
Component-Based Design of Embedded Software: An Analysis of Design Issues -- Component-Based Design of Embedded Software: An Analysis of Design Issues -- How Design Patterns Affect Application Performance – A Case of a Multi-tier J2EE Application -- An MDA-Based Approach for Inferring Concurrency in Distributed Systems -- Task-Based Access Control for Virtual Organizations -- Self-Deployment …
Data-Based Applications -- to OGSA-DAI Services -- Using OGSA-DQP to Support Scientific Applications for the Grid -- Mobile Agent-Based Service Provision in Distributed Data Archives -- A Proxy Service for the xrootd Data Server -- A Flexible Two-Level I/O Architecture for Grids -- Data Driven Infrastructure and Policy Selection to Enhance Scientific Applications in Grid -- BioApplications -- M…
Scenarios: Models, Transformations and Tools -- Why Timed Sequence Diagrams Require Three-Event Semantics -- Some Methodological Observations Resulting from Experience Using LSCs and the Play-In/Play-Out Approach -- Deciding Properties of Message Sequence Charts -- Operational Semantics of Security Protocols -- Autonomous Shuttle System Case Study -- Genetic Design: Amplifying Our Ability to De…
Towards an Event-Driven Architecture: An Infrastructure for Event Processing Position Paper -- Enabling Semantic Web Inferencing with Oracle Technology: Applications in Life Sciences -- A Realistic Architecture for the Semantic Web -- Active Rules in the Semantic Web: Dealing with Language Heterogeneity -- Towards an Abstract Syntax and Direct-Model Theoretic Semantics for RuleML -- A Semantic …
RoboCup 2004 Overview -- RoboCup 2004 Overview -- Award Winner Papers -- Map-Based Multiple Model Tracking of a Moving Object -- UCHILSIM: A Dynamically and Visually Realistic Simulator for the RoboCup Four Legged League -- Full Papers -- CommLang: Communication for Coachable Agents -- Turning Segways into Robust Human-Scale Dynamically Balanced Soccer Robots -- A Constructive Feature Detection…
The Object Flow Graph -- Class Diagram -- Object Diagram -- Interaction Diagrams -- State Diagrams -- Package Diagram -- Conclusions.In software evolution and maintenance, the ultimate, most reliable description of a system is its source code. Reverse engineering aims at extracting abstract, goal-oriented views from the code, to summarize relevant properties of program computations. Reverse Eng…
Digital Library Models and Architectures -- Requirements Gathering and Modeling of Domain-Specific Digital Libraries with the 5S Framework: An Archaeological Case Study with ETANA -- On the Effective Manipulation of Digital Objects: A Prototype-Based Instantiation Approach -- LibraRing: An Architecture for Distributed Digital Libraries Based on DHTs -- Multimedia and Hypermedia Digital Librarie…
A Generic Process for Requirements Engineering -- System Modelling for Requirements Engineering -- Writing and Reviewing Requirements -- Requirements Engineering in the Problem Domain -- Requirements Engineering in the Solution Domain -- Advanced Traceability -- Management Aspects of Requirements Engineering -- DOORS: A Tool to Manage Requirements.This second edition follows quickly on the ?rst…